{"id":76220,"date":"2024-06-21T07:19:50","date_gmt":"2024-06-21T07:19:50","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/16\/phishing-resistant-mfa-2\/"},"modified":"2025-01-17T15:26:41","modified_gmt":"2025-01-17T15:26:41","slug":"phishing-resistant-mfa-2","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/","title":{"rendered":"Phishing Resistant MFA"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Are you looking for the most \u200dreliable and secure way\u200c to protect your digital activities? Introducing Phishing Resistant MFA \u2062(Multi-Factor Authentication): a modern solution for keeping your online presence \u2062safe\u2064 and secure. \u200bPhishing Resistant MFA offers advanced levels\u2064 of authentication that protect you from malicious attacks such as\u2063 phishing\u200c attempts and data breaches. By implementing this solution, you \u200bcan ensure \u2062that your authentication credentials remain confidential\u200b and that third-party access to your accounts \u200cis \u200drestricted. This \u200cpowerful security protection is quickly \u2062becoming the go-to\u2063 choice for finance, healthcare, retail, government and other industries looking for the best protection\u2064 against phishing schemes, online theft and cybercrime.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#1_What_Is_Phishing%E2%81%A4_Resistant_Multi-factor_Authentication\" >1. What Is Phishing\u2064 Resistant Multi-factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#2_Keep_Your_Accounts_Protected_From_Hackers%E2%81%A3_With%E2%81%A3_Phishing_%E2%80%8CResistant_MFA\" >2. Keep Your Accounts Protected From Hackers\u2063 With\u2063 Phishing \u200cResistant MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#3_The_Benefits_of_Using_%E2%80%8DPhishing_%E2%80%8DResistant_MFA\" >3. The Benefits of Using \u200dPhishing \u200dResistant MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#4_%E2%81%A3Securing_Your_Account_with_Phishing_Resistant_Multi-factor%E2%81%A2_Authentication\" >4. \u2063Securing Your Account with Phishing Resistant Multi-factor\u2062 Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#Benefits_of_Phishing_Resistant_Multi-factor_Authentication\" >Benefits of Phishing Resistant Multi-factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa-2\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-phishing-resistant-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_Is_Phishing%E2%81%A4_Resistant_Multi-factor_Authentication\"><\/span>1. What Is Phishing\u2064 Resistant Multi-factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Max Word Count: \u2062250<\/p>\n<p>Phishing resistant multi-factor authentication is an\u2062 effective security measure that is used to protect sensitive data, accounts and other assets from malicious hackers and \u200ccybercriminals. It involves\u2064 combining two or more authentication methods that make\u2062 it harder \u2062for criminals to gain access to the system. This type of authentication helps to verify\u200c identity\u200b and protect\u2062 the data from unauthorized access.<\/p>\n<p>One of the main \u200bbenefits of phishing resistant multi-factor \u2064authentication is that it helps to identify users more accurately than single-factor authentication.\u200d It requires the user to \u200cprovide multiple pieces of evidence, such as:<\/p>\n<ul>\n<li><strong>Biometrics<\/strong>\u2014using fingerprints or facial \u2062recognition\/voice authentication.<\/li>\n<li><strong>Physical tokens<\/strong> \u2014using a physical access card or code-generating device.<\/li>\n<li><strong>Knowledge-based authentication<\/strong> \u2014using passwords and security\u200c questions.<\/li>\n<\/ul>\n<p>These \u200dfactors help\u200c to provide an additional layer\u200c of security and verify a\u200b user\u2019s identity. It also helps\u2064 to prevent hackers from accessing the network \u2063or system because\u2062 they need to know more than just a single piece of information.<\/p>\n<h2 id=\"2-keep-your-accounts-protected-from-hackers-with-phishing-resistant-mfa\"><span class=\"ez-toc-section\" id=\"2_Keep_Your_Accounts_Protected_From_Hackers%E2%81%A3_With%E2%81%A3_Phishing_%E2%80%8CResistant_MFA\"><\/span>2. Keep Your Accounts Protected From Hackers\u2063 With\u2063 Phishing \u200cResistant MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA) is the strongest defense against hackers \u200bstealing your private data. Without MFA, hackers\u200c find it easy \u200cto gain access to your\u200b accounts. By implementing \u200dphishing resistant MFA, you can be sure to keep your accounts\u2064 secure.<\/p>\n<ul>\n<li><b>Create\u200c strong passwords:<\/b> Use a combination of uppercase\u2063 and\u2064 lowercase letters, numbers, \u2063and special characters to create secure passwords for\u2064 all \u2064your accounts.<\/li>\n<li><b>Use a password manager:<\/b> Store all your passwords in a secure place using\u2063 a password manager \u200bto prevent hackers from \u200daccessing your accounts.<\/li>\n<li><b>Implement\u2062 MFA:<\/b> Add an extra layer\u200c of security to\u200d your\u200b accounts with\u2062 MFA. It\u2062 requires an additional verification, such as a code sent to your phone \u200cor a biometric scan, in order to access the account. \u2064<\/li>\n<li><b>Choose a MFA with phishing protection:<\/b> Look for a MFA solution with phishing \u2064resistance so \u2062hackers won\u2019t \u2064be \u200bable to use phishing techniques to access your accounts.<\/li>\n<\/ul>\n<p>There \u2063are \u2064many MFA solutions available on the market \u200cthat \u2064offer phishing resistant protection. Choose \u200done\u2063 that\u2064 best suits your needs and add it to your accounts immediately. This \u2064will ensure\u200b everyone\u2019s \u200daccounts remain safe from\u200d hackers.<\/p>\n<h2 id=\"3-the-benefits-of-using-phishing-resistant-mfa\"><span class=\"ez-toc-section\" id=\"3_The_Benefits_of_Using_%E2%80%8DPhishing_%E2%80%8DResistant_MFA\"><\/span>3. The Benefits of Using \u200dPhishing \u200dResistant MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Enhanced Security<\/b><br \/>Phishing \u2063resistant Multi-Factor\u200d Authentication (MFA) offers an extra layer of security to an online user\u2019s \u2064account, preventing access and protecting sensitive data from malicious threat \u200dactors. By using MFA, users can increase their authentication \u200bsecurity, since they\u200c must use two or more different methods of\u2062 authentication to\u2064 access their account. This \u200cmakes it more \u2064difficult for attackers to \u200baccess user \u2064information, as they must\u200b be able to\u200d use each of the different \u200dMFA authentication methods.<\/p>\n<p><b>Portable Authentication<\/b><br \/>MFA \u200balso provides users with greater portability, so they can access \u2062their online account from \u2064multiple devices. Many MFA solutions, such as biometric authentication,\u200d are designed to work on\u2064 both traditional and\u200b mobile devices. This\u2062 means users can securely access their account \u2063from anywhere, without having\u2064 to\u2062 worry about\u2062 the authentication methods being limited \u2064to their\u200d own device. It \u200balso\u200c helps them to keep up with\u2062 the latest trends in cyber \u200csecurity and remain protected in the ever-changing digital\u2064 landscape.<\/p>\n<ul>\n<li>MFA offers enhanced security through\u200c multiple \u2062authentication methods<\/li>\n<li>MFA authentication is portable, allowing\u200d users to\u2063 access \u200ctheir accounts from multiple devices<\/li>\n<li>Biometric authentication technologies offer \u2063a \u2064convenient way to secure user \u2062access<\/li>\n<\/ul>\n<h2 id=\"4-securing-your-account-with-phishing-resistant-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_%E2%81%A3Securing_Your_Account_with_Phishing_Resistant_Multi-factor%E2%81%A2_Authentication\"><\/span>4. \u2063Securing Your Account with Phishing Resistant Multi-factor\u2062 Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It\u2019s no\u200b secret that security \u2062is a top \u2063priority when it comes to protecting\u200b your accounts and data online.\u2063 The\u2064 best \u200bway to guarantee your security is to \u2063secure your\u200b accounts with \u2063a Phishing Resistant Multi-factor Authentication system. Here are some \u200dof \u200cthe \u200cfeatures that make it the best\u200b security option:<\/p>\n<ul>\n<li>Secure\u200c &amp; Simple: Multi-factor\u2062 Authentication adds an extra layer of security to your accounts while keeping \u2062it simple to use. Login process is streamlined and secure \u2013 all you need is the username\u2064 and password, eliminating \u2064the need for any additional\u2064 hardware or software.<\/li>\n<li><b>Phishing Resistant: <\/b>Multi-factor Authentication is resistant\u200c to \u2062phishing attacks, which can\u2062 easily compromise a standard username and password system. It \u200cutilizes authentication stages that must match corresponding\u200b criteria\u2062 in order \u200cto gain access.<\/li>\n<li><b>Differentiated Login\u2063 Screens:<\/b> Multi-factor Authentication has several different login\u200c screens, depending on the type of \u2064authentication and level\u200b of security you need. This prevents anyone trying to guess your username and password by \u200cusing one consistent\u200c interface.<\/li>\n<li><b>Time-sensitive \u2064Codes:<\/b> Unlike a username and password \u200dcombination, which can\u2064 easily \u200dbe guessed or forgotten, Multi-factor Authentication uses time-sensitive codes that are sent directly \u2063to\u2064 your device. Making \u200bit \u200dnear \u200bimpossible to hack into your \u200daccounts.<\/li>\n<\/ul>\n<p>No matter how secure your accounts are, \u200cit is important to remember that you should always be\u2062 cautious when logging \u200bin and\u200b changing your passwords frequently. Make sure you \u2062have a Phishing Resistant Multi-factor Authentication in place\u2063 to keep\u200d your information safe and secure. \u2064<\/p>\n<p><span style=\"font-size: revert; color: initial;\">Phishing-resistant multi-factor authentication (MFA) is a crucial component of modern cybersecurity measures, aimed at protecting sensitive data and systems from malicious actors. Multi-factor authentication involves the use of multiple authentication factors, such as passwords, biometrics, or physical devices, to verify the identity of the user. This added layer of security makes it significantly more difficult for cybercriminals to gain unauthorized access to networks or accounts through phishing attacks or brute force attempts. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Phishing-resistant authentication methods, such as facial recognition or hardware security keys, enhance the security of the authentication process by making it challenging for bad actors to impersonate legitimate users. By implementing strong authentication standards and secure access controls, organizations can mitigate the risks of social engineering attacks, bombing attacks, or bypass attacks.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\"> Additionally, cloud services and internal systems can benefit from secure login practices and adaptive authentication measures to protect against unauthorized access. The use of digital certificates, mobile applications, and PKI-based MFA further strengthens the authentication process and ensures a seamless user experience. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">With the evolving threat landscape and increasing complexity of phishing attacks, it is essential for businesses to adopt robust authentication methods to safeguard their critical systems and data from cyber threats. Sources such as the National Institute of Standards and Technology (NIST) guidelines and cybersecurity industry reports offer valuable insights and best practices for implementing phishing-resistant MFA solutions. By leveraging the latest technologies and authentication standards, organizations can enhance the security of their networks and defend against cyber threats effectively.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Phishing Resistant MFA is a crucial tool in today&#8217;s cybersecurity landscape to protect against malicious actors attempting to gain unauthorized access to sensitive data. Multi-factor authentication (MFA) is a widely recognized method of enhancing security by requiring users to provide multiple forms of verification before gaining access to an account or system. Passwordless MFA, Two-factor authentication, and authentication codes are all examples of MFA methods that can help thwart brute force attacks and phishing attempts. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Security questions and remote worker access are also important considerations when implementing a phishing-resistant method of authentication. The gold standard for MFA is to utilize a combination of valid requests from various forms of authentication, such as passwordless authentication, hardware devices like smart cards, and mobile apps for secure methods of verification. This multi-factor approach helps to ensure that only authorized users can access systems and data, reducing the risk of unauthorized access. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Additionally, incorporating device-bound passkeys, verifier impersonation resistance, and strong binding techniques can further strengthen the security model and protect against potential threats. With the vast majority of cyberattacks leveraging phishing tactics to trick users into revealing sensitive information, it&#8217;s crucial for organizations to implement robust MFA solutions to safeguard their networks and data. By utilizing a combination of authentication factors and security measures, businesses can create a secure and seamless experience for users while minimizing the risk of unauthorized access. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">The implementation of access controls, authentication policies, and security checks at the device level can help mitigate the risk of attacks and ensure that only authorized users have access to sensitive information. By staying informed about the latest authentication methods and security technologies, organizations can enhance their overall cybersecurity posture and protect their valuable assets from potential threats. sources: Microsoft<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Phishing_Resistant_Multi-factor_Authentication\"><\/span>Benefits of Phishing Resistant Multi-factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th style=\"font-weight: bold; font-size: 1.2em; background-color: lightgray;\">Feature<\/th>\n<th style=\"font-weight: bold; font-size: 1.2em; background-color: lightgray;\">Description<\/th>\n<\/tr>\n<tr>\n<td style=\"text-align: center; background-color: lightblue;\">Enhanced Security<\/td>\n<td style=\"text-align: center;\">MFA offers additional layers of authentication for increased security<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">Portable Authentication<\/td>\n<td style=\"text-align: center;\">Access accounts securely from various devices<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; background-color: lightblue;\">Biometric Authentication<\/td>\n<td style=\"text-align: center;\">Provides convenient and secure user access<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">Differentiated Login Screens<\/td>\n<td style=\"text-align: center;\">Multiple login interfaces prevent access by unauthorized individuals<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; background-color: lightblue;\">Time-sensitive Codes<\/td>\n<td style=\"text-align: center;\">Dynamic codes ensure secure access to accounts<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is \u2063phishing resistant MFA?<br \/>A:\u2064 Phishing resistant MFA or \u200bMulti-Factor\u200d Authentication is a way to protect \u2063computer systems and accounts from hackers and \u2062people who try to access your information without permission. It combines something that \u200byou \u200dknow (like a password or\u2062 pin code) with \u200bsomething that\u200b you have (like a cellphone or\u200c security\u200d token). This makes it much more difficult for a hacker to get into \u2062your system or account.<\/p>\n<p><span style=\"font-size: revert; color: initial;\">Q: What is Phishing-Resistant MFA?<\/span><\/p>\n<p>A: Phishing-Resistant MFA, or Phishing-Resistant Multifactor Authentication, is a secure authentication method that utilizes multiple factors to verify the identity of a user before granting access to online services. This method helps protect against common phishing attacks, man-in-the-middle attacks, and other cyber threats by requiring additional verification beyond just login credentials.<br \/><br \/>Q: What are some examples of Phishing-Resistant MFA methods?<br \/>A: Examples of Phishing-Resistant MFA methods include using security keys, one-time passwords, certificate-based authentication, authenticator apps, and biometric systems. These methods provide a higher level of security compared to traditional password-based authentication.<br \/><br \/>Q: How does Phishing-Resistant MFA protect against phishing scams?<br \/>A: Phishing-Resistant MFA adds an extra layer of security by requiring multiple factors to authenticate a user&#8217;s identity. This makes it more difficult for malicious actors to gain access to accounts through phishing scams or other credential-based attacks.<br \/><br \/>Q: What are some common authentication factors used in Phishing-Resistant MFA?<br \/>A: Common authentication factors used in Phishing-Resistant MFA include something the user knows (such as a password), something the user has (such as a security key or mobile phone), and something the user is (such as biometric data like a fingerprint or voice recognition).<br \/><br \/>Q: How does Phishing-Resistant MFA improve security posture?<br \/>A: Phishing-Resistant MFA strengthens security posture by adding additional layers of protection against cyber threats. By requiring multiple factors for authentication, organizations can better defend against credential-based attacks, identity attacks, and other security threats.<br \/><br \/>Please note that the information provided above is based on general knowledge of Phishing-Resistant MFA and best practices in cybersecurity. For specific implementation guidance and detailed technical information, it is recommended to consult cybersecurity experts or official documentation from reputable sources such as the FIDO Alliance or the Federal Zero Trust Strategy.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"6b0b6b04-aa23-4e9d-81e7-bc4f2d4d62ca\" data-message-model-slug=\"gpt-4o-mini\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Keep your accounts and sensitive information secure with <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce&#8217;s<\/a> phishing-resistant multi-factor authentication (MFA). LogMeOnce helps ensure safe access to your accounts by using advanced technology to protect your data from phishing attacks. Start using LogMeOnce for free and safeguard your accounts from phishing and other cyber threats. With LogMeOnce\u2019s phishing-resistant MFA, your data remains safe and secure.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"mb-2 flex gap-3 empty:hidden -ml-2\">\n<div class=\"items-center justify-start rounded-xl p-1 flex\">\n<div class=\"flex items-center\"><button class=\"rounded-lg text-token-text-secondary hover:bg-token-main-surface-secondary\" aria-label=\"Read aloud\" data-testid=\"voice-play-turn-action-button\"><\/button><button class=\"rounded-lg text-token-text-secondary hover:bg-token-main-surface-secondary\" aria-label=\"Copy\" data-testid=\"copy-turn-action-button\"><\/button>\n<div class=\"flex\">\u00a0<\/div>\n<div class=\"flex items-center pb-0\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<p><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing resistant MFA is essential to keep your accounts secure. To strengthen your protection, create a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring. Stay safe from phishing threats today!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[939,1294,11055,10933,931,781],"class_list":["post-76220","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-phishing","tag-authentication","tag-mfa","tag-multi-factor-authentication","tag-online-security","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/76220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=76220"}],"version-history":[{"count":3,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/76220\/revisions"}],"predecessor-version":[{"id":240891,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/76220\/revisions\/240891"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=76220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=76220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=76220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}