virtual image of a globe resting on a calculator
Resources

Best practices for data security and cybersecurity incident mitigation

Oct 01, 2023 · 3 min read

SECTION

EXCLUSIVE

Alert

Recently, cyber threat actors are attempting to get around multifactor authentication (MFA) by using a technique known as MFA bombardment or MFA abuse. In this attack, the threat actor uses stolen credentials (gained from a phishing attack or purchased illicitly online) and then spams a user with MFA push notifications (prompts sent to a mobile phone where a user only has to press a button to grant access) to get the user to accept just one of the requests.

Reserved for Tax Section Members

Already a Tax Section Member?

Log in with your account
 
Forgotten email
Forgotten password

Not a Tax Section Member?

To gain access to exclusive content, your first step is to join the AICPA & CIMA.

Discover the benefits of:

Related content