Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 17, 2025
  1. All
  2. IT Services
  3. Cybersecurity

Clients resist multi-factor authentication for simplicity. How will you secure their data effectively?

How do you balance simplicity and security? Share your strategies for keeping client data safe.

Cybersecurity Cybersecurity

Cybersecurity

+ Follow
Last updated on Mar 17, 2025
  1. All
  2. IT Services
  3. Cybersecurity

Clients resist multi-factor authentication for simplicity. How will you secure their data effectively?

How do you balance simplicity and security? Share your strategies for keeping client data safe.

Add your perspective
Help others by sharing more (125 characters min.)
20 answers
  • Contributor profile photo
    Contributor profile photo
    Santosh Kumar CISSP, PMP, CISA, CHFI, CIPP/E, CIPM, AIGP

    Cybersecurity & Data Protection Leader | CISO & DPO | GenAI Architect | Fellow of Information Privacy (FIP) | Navy Veteran 🏫 IIT Madras| IIM Indore

    • Report contribution

    "Security is not about inconvenience; it's about resilience." 🎯 Invisible Security – Use adaptive authentication that prompts MFA only for risky logins. 🎯 Biometric Convenience – Enable fingerprint or facial recognition for seamless access. 🎯 Single-Tap MFA – Implement push notifications instead of codes to reduce friction. 🎯 Risk-Based Access – Allow low-risk transactions without MFA but enforce it for sensitive actions. 🎯 Educate with Impact – Show real-world breach examples to highlight the need for strong security.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Harry Waldron, CPCU

    Associate Consultant @ Voyage Advisory

    • Report contribution

    In 2025, MFA (2 or more steps to login) should actually be a norm. If a company is just now adopting MFA/VPN they are actually behind best practices. VPN/MFA + complex GPO based Passwords will be enforced for every user needing access. Mandatory PASSWORD COMPLEXITY (8+ length, upper/lower case, numbers, special characters). For years it's been that way, as corporate security is always much stronger than standard internet site access Everyone needs to see value of strengthening TECH & HUMAN security controls to the MAX. Security Awareness programs need to be improved so users fully understand the need to sometimes jump thru an extra hoop on MFA or other extra controls

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To secure their data effectively, you need to first try to make this authentication process as simple as possible. This is to avoid your users from feeling that this is a hastle for them. You need to also use encryption tools. This is to ensure that no one can hack in and decipher their data. You must also make sure that your system and software are regularly updated and equipped with firewall and antivirus. This is to ensure that it's capable of preventing a data breach.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Yusuf Usman

    Cybersecurity Incident Response & Business Continuity @ Help at Home | Research Assistant In Cybersecurity @ Quinnipiac University

    • Report contribution

    Balancing simplicity and security is crucial. For clients resistant to multi-factor authentication (MFA), consider adaptive authentication, which uses context (location, device, behavior) to assess risk and only prompts for MFA when necessary. Implement passwordless options like biometrics or hardware tokens for ease of use. Educate clients on the risks of weak security and the value of MFA in protecting their data. Additionally, leverage encryption, regular audits, and zero-trust frameworks to ensure robust protection without overburdening users. Simplifying the user experience while maintaining strong security is key to client trust and compliance.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Maycon Prado Rocha Silva

    Technology Executive | Scalable Software & AI | Cloud, DevOps & Agile Leadership | Engineering & Product Strategy

    • Report contribution

    One of the biggest challenges in security is finding the balance between usability and protection. Many clients resist Multi-Factor Authentication (MFA) due to friction, but removing it increases vulnerability to attacks. So, how can we ensure security without compromising the user experience? Adaptive Authentication: Risk-based authentication that asks for MFA only when anomalies are detected. Biometric Authentication: A frictionless way to verify identity using fingerprint, face recognition, or voice. Passkeys & FIDO2: Eliminating passwords while ensuring strong authentication. Behavioral Analysis: Using AI to detect suspicious patterns and trigger additional security only when needed.

    Like
    1
View more answers
Cybersecurity Cybersecurity

Cybersecurity

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Cybersecurity

No more previous content
  • Your client doubts your incident response plan's effectiveness. How will you address their concerns?

    66 contributions

  • Facing a data breach with non-technical executives, how do you build trust through communication?

    67 contributions

  • How would you balance client confidentiality with disclosing cybersecurity breaches?

    33 contributions

  • You've experienced a data breach. How can you inform your clients without losing their trust?

    78 contributions

  • Your client wants lax security for easier access. How do you protect against potential cyber threats?

    44 contributions

  • You're upgrading your business's technology. How can you safeguard against cyber threats?

    69 contributions

  • Balancing user experience and cybersecurity in your organization: Are you willing to take the risk?

    75 contributions

  • Balancing user productivity and cybersecurity integrity is crucial. How can you achieve both effectively?

    44 contributions

  • You're facing a cybersecurity incident. How should you manage media inquiries effectively?

    44 contributions

  • A team member falls for a phishing email. How can you prevent a cybersecurity breach?

    122 contributions

  • You need to simplify user authentication for your platform. How can you do it without sacrificing security?

    38 contributions

  • You’re considering a new third-party vendor. How do you assess their cybersecurity risks?

    28 contributions

  • Your team member is ignoring remote cybersecurity duties. How will you address this critical breach?

    52 contributions

  • An executive requests unauthorized access for convenience. Do you compromise cybersecurity for convenience?

    28 contributions

  • Your employees think cybersecurity policies are too restrictive. How do you address their concerns?

    101 contributions

No more next content
See all

More relevant reading

  • Computer Maintenance
    What are the risks of skipping disk cleanup and defrag for a long time?
  • Information Security
    What are the most effective ways to manage conflicts with government regulators in information security?
  • Data Analysis
    You’re collecting data for your company. How can you ensure it’s safe from prying eyes?
  • Infrastructure Security
    How do you implement a key rotation policy that balances security and performance?

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Security
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
1
20 Contributions