

The recent cyber-espionage campaign by the Chinese group Salt Typhoon compromised U.S. telecommunications networks in significant ways, raising red flags about the reliability of SMS-based multi-factor authentication (MFA). Attackers breached major carriers, including AT&T, Verizon, and T-Mobile, gaining access to sensitive data like call records, live calls, and unencrypted text messages.
These vulnerabilities expose a glaring issue: SMS was never an acceptable option for securing accounts. The recent telecommunications breaches should put an end to any doubt.

Sauron Cell Towers
Too much friction - If our users have to do anything extra, they won’t buy from us.
High support burden - Our support team will be overwhelmed with calls about login issues.
Snowflake - Our situation is unique, and the standard advice doesn’t apply to us.
The good news? These excuses no longer hold water. User behavior and authentication technologies have evolved. It’s now possible to build systems that are both secure and user-friendly.
The first step in upgrading authentication is understanding your risk. NIST SP 800-63 provides a clear framework for identifying the right authentication approach based on your specific use case.
Too much friction - If our users have to do anything extra, they won’t buy from us.
High support burden - Our support team will be overwhelmed with calls about login issues.
Snowflake - Our situation is unique, and the standard advice doesn’t apply to us.
Low: Minimal harm - minor inconvenience.
Moderate: Significant harm, like financial losses or reputational damage.
High: Catastrophic harm, like severe financial loss or safety risks.

NIST Authentication Assurance Levels
Something You Know: A password or PIN.
Something You Have: A physical device like a hardware token or phone.
Something You Are: Biometrics like fingerprints or facial recognition.

Summary of Authenticator Types
Password (something you know) + Hardware token (something you have) = MFA ✅
SMS OTP (something you have) + Email OTP (also something you have) = Not MFA. ❌
Standard implementations can be dropped in with minimal effort
A vendor can help absorb the increase in support calls that typically follow a new authentication system rollout
As always, the disadvantage of a purchased solution is the potential limitation in customization. However, before overstating this concern, it's important to determine whether that customization is genuinely necessary.
If building a solution is the right decision for your organization, it must be carefully planned and executed. Viewing this solely as a technical project is a mistake. Authentication solutions are cross-functional initiatives that should be managed as a product suite to ensure success.
Identify security requirements and assurance levels (AAL) for your authentication system.
Conduct a risk assessment to understand potential threats and vulnerabilities.
Choose authentication factors that meet your organization’s usability and security needs (e.g., passkeys, hardware tokens).
Use encryption to protect sensitive data in transit and at rest.
Implement phishing-resistant MFA options (e.g., Passkeys, or FIDO2-based hardware tokens like YubiKeys).
Conduct penetration testing on the authentication system to identify weaknesses.
Establish monitoring and logging to detect unauthorized access attempts.
Conduct user training on the new authentication process.
Roll out in phases, starting with low-risk user groups, to minimize disruption.
Monitor system performance and user feedback to identify any issues post-launch.
Set up ongoing maintenance and update cycles for your authentication system.
Ensure fallback mechanisms (e.g., account recovery) are secure and user-friendly.
