{"id":651,"date":"2025-10-20T12:31:33","date_gmt":"2025-10-20T17:31:33","guid":{"rendered":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/?p=651"},"modified":"2025-10-20T12:31:53","modified_gmt":"2025-10-20T17:31:53","slug":"mfa-fatigue-in-2025","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/blog\/mfa-fatigue-in-2025\/","title":{"rendered":"MFA-Fatigue-in-2025"},"content":{"rendered":"<h1 style=\"text-align: center\"><strong>MFA Fatigue Is the 2025 Breach Enabler: <\/strong><\/h1>\n<h4 style=\"text-align: center\"><span style=\"color: #ff0000\"><strong>Why Push-Based MFA Is Failing North American Businesses\u2014and How to Fix It Before Insurers Raise Your Premiums<\/strong><\/span><\/h4>\n<hr \/>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><span style=\"color: #ff0000\">Multi-factor authentication (MFA)<\/span> remains one of the strongest defenses against account takeovers\u2014but in 2025, it\u2019s showing cracks. The rise of\u00a0<strong><em>MFA fatigue<\/em><\/strong>\u00a0(also known as\u00a0<span style=\"color: #ff0000\"><strong><em>push bombing<\/em><\/strong><\/span>) is turning trusted security into an attacker\u2019s tool. Across North America, large organizations\u2014from airlines to financial firms\u2014are learning that simply having MFA is no longer enough.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">The good news: the same insurers raising standards to reflect this trend are also signaling exactly what controls stop these attacks and what documentation organizations must maintain to get paid when incidents do occur.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Here we break down the latest 2025 breaches, what MFA fatigue looks like in action, how loss trends and regulatory data tie together, and concrete identity-hardening steps every business should take this year.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">What Is MFA Fatigue\u2014and Why It Works<\/span><\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In a typical attack, criminals use stolen credentials to trigger a flood of push notifications, robocalls, or one-time passcode requests. The goal: exhaust the target until they tap \u201cApprove\u201d out of annoyance or confusion. When combined with social engineering\u2014voice phishing, SIM swapping, or help-desk impersonation\u2014this bypasses weak factors almost effortlessly.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>Legacy MFA<\/strong> methods based on <strong>SMS<\/strong>, <strong>push notifications<\/strong>, or s<strong>imple OTP codes<\/strong> c<span style=\"color: #ff0000\"><em><strong>an\u2019t distinguish a legitimate user from an attacker holding stolen credentials<\/strong><\/em><\/span>. By contrast, phishing-resistant MFA\u2014like <strong>FIDO2 security keys<\/strong>\u2014ties the authentication to the physical device and user verification.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">2025 Case Snapshots: Airlines as a Warning Sign<\/span><\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><span style=\"color: #800000\"><strong>Hawaiian Airlines (USA)<\/strong><\/span><br \/>\nIn June and July 2025, Hawaiian Airlines was hit by a cyberattack that disrupted IT systems and triggered regulatory alerts. Investigation reports cited MFA fatigue combined with real-time phishing as a key intrusion vector\u2014mirroring Scattered Spider\u2019s playbook. Even with strong resources, the organization\u2019s use of push-based factors created an opening that identity-layer social engineering exploited.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><span style=\"color: #800000\"><strong>WestJet (Canada)<\/strong><\/span><br \/>\nWestJet\u2019s June 13th incident affected roughly 1.2 million customers, according to disclosures through October. While the airline did not explicitly confirm MFA bypass, U.S. and Canadian threat intel attributed similar campaigns in this timeframe to groups leveraging MFA fatigue, vishing, and help-desk social engineering to add attacker-controlled devices.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>The takeaway:<\/strong>\u00a0MFA fatigue remains an active, scalable threat\u2014especially when layered with human manipulation and weak help-desk verification.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">The 2025 Breach Numbers Speak for Themselves<\/span><\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Average U.S. breach cost<\/span>:<\/strong>\u00a0$10.22 million (up 9% over 2024)<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Global average<\/span>:<\/strong>\u00a0$4.44 million<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Human element share<\/span>:<\/strong>\u00a0~60% of breaches (phishing, pretexting, social engineering-related MFA bypass)<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Even with EDR, backups, and rapid containment, North American enterprises face eight-figure exposure when identity compromise reaches sensitive data or operational systems.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">In simpler terms: if your MFA can be tricked, the financial exposure now matches the largest ransomware losses of the past decade.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">How Cyber Insurers Are Responding in 2025<\/span><\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>1. <span style=\"color: #800000\">Underwriting Evolution: \u201cPhishing-Resistant MFA Preferred\u201d<\/span><\/strong><br \/>\nCyber insurers and brokers now treat MFA as a baseline\u2014not a differentiator. To qualify for favorable terms, organizations are being nudged toward security keys and number-matching controls. Expect questionnaires to explicitly ask whether all admins and remote users are covered by phishing-resistant MFA.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>2. <span style=\"color: #800000\">Drop in Claim Severity\u2014When Controls Are Mature<\/span><\/strong><br \/>\nAllianz and other carriers report roughly a 50% drop in claim severity during H1 2025, thanks to more consistent detection, response maturity, and identity controls. Those without these standards, however, face higher sublimits and denials.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>3. <span style=\"color: #800000\">Risk Data Becomes Evidence<\/span><\/strong><br \/>\nApplications and renewal packets now demand proof: MFA enforcement logs, restore-test results, help-desk scripts, EDR dashboards, and phishing-training rosters. Coverage can be reduced\u2014or denied\u2014if evidence isn\u2019t ready when a claim hits.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">The message is clear: it\u2019s not enough to have security controls. You must\u00a0<em>document and maintain evidence<\/em>\u00a0that they\u2019re active and enforced.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">Why Business Insurance Won\u2019t Cover Cyber Losses<\/span><\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Many U.S. and Canadian companies still assume general liability or BOP policies cover cyber events. In 2025, courts\u2014including a notable Sixth Circuit ruling\u2014affirmed that CGL policies with electronic-data exclusions cannot be used to recover cyber losses.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Real recovery\u2014incident response, ransom negotiation, regulatory defense, and reputational damage\u2014requires stand-alone\u00a0<strong>cyber insurance<\/strong>. Traditional policies simply aren\u2019t designed for this domain.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">How to Stop MFA Fatigue (and Impress Your Insurer)<\/span><\/h2>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>1. <span style=\"color: #800000\">Go Phishing-Resistant Where It Counts<\/span><\/strong><br \/>\nDeploy FIDO2\/WebAuthn compatible security keys for administrators, remote logins, and privileged accounts. Pair these with conditional access based on device posture and geolocation.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>2. <span style=\"color: #800000\">Harden Remaining Push MFA<\/span><\/strong><br \/>\nIf any push MFA remains, enforce number-matching, limit prompt attempts, and alert or lock accounts when thresholds are exceeded. Microsoft set number-matching as default in 2025\u2014make sure it\u2019s in use.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>3. <span style=\"color: #800000\">Lock Down Your Help Desk<\/span><\/strong><br \/>\nStandardize identity checks for MFA resets and device enrollment. Use out-of-band verification or ticket-based authentication rather than voice confirmation alone.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>4. <span style=\"color: #800000\">Manage Tokens Like Credentials<\/span><\/strong><br \/>\nMonitor session behavior, revoke risky sessions, and shorten token lifetimes. In 2025, token theft emerged alongside MFA fatigue as part of a single identity threat class.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong>5. <span style=\"color: #800000\">Maintain Structured Proof for Claims<\/span><\/strong><br \/>\nBuild a digital binder of exportable evidence\u2014MFA enforcement screenshots, key-registration logs, backup test reports, and awareness training records. If your insurer requests documentation during a claim, you\u2019ll be ready.<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\"><span style=\"color: #ff0000\">An Insurer-Aligned Quick Checklist<\/span><\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Identity<\/span>:<\/strong>\u00a0FIDO2 for admins and remote users; number matching enforced; conditional access by device and geo<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Detection<\/span>:<\/strong>\u00a0EDR + MDR or a 24\u00d77 SOC model<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Backup<\/span>:<\/strong>\u00a0Immutable\/offline, with quarterly restore tests and screenshots<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Help Desk<\/span>:<\/strong>\u00a0Strict out-of-band verification for all reset or add-device requests<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Training<\/span>:<\/strong>\u00a0Quarterly phishing and vishing simulations, including MFA-fatigue scenarios<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Vendors<\/span>:<\/strong>\u00a0Mandatory security clauses and breach notification SLAs<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><strong><span style=\"color: #800000\">Policy Fit<\/span>:<\/strong>\u00a0Review coverage exclusions and confirm your controls align with insurer expectations<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\"><span style=\"color: #ff0000\"><strong>Schedule a 30-minute Identity Risk Review &#8211; Contact <a href=\"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/contact-us\/\">CMIT Solutions<\/a> today.<\/strong><\/span><\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">We\u2019ll analyze your current MFA setup, help-desk flows, and privileged access controls against 2025 insurer standards. Within 60 days, you\u2019ll have a roadmap to harden authentication, close social engineering gaps, and back your cyber policy with strong compliance evidence.<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">#CyberSecurity2025 #MFAFatigue #IdentitySecurity #CyberInsurance #DataProtection #FIDO2 #ManagedSecurity #ZeroTrust #BusinessContinuity #NorthAmericaCyber #CyberRisk #GenAI #rutgers #remba #mcrcc #mccc #newjersey #njccic #njsbdc #sbdc #njlaw #cpas #nonprofit #education #school #cmitsolutions #ExtensionSecurity #ThreatIntelligence #ZeroTrust #DataPrivacy #Phishing #Malware #CyberDefense #SecureYourData #CybersecurityTips #Tech #DigitalSafety #StaySafeOnline #Security #ClientAccountingServices #CAS #CPA #AccountingFirm #ZeroTrust #DataProtection #DisasterRecovery #CFO #ManagedIT #NJBusiness #FinanceSecurity #DataBreach<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MFA Fatigue Is the 2025 Breach Enabler: Why Push-Based MFA Is Failing&#8230;<\/p>\n","protected":false},"author":217,"featured_media":652,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[188,189,190],"class_list":["post-651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-cybersecurity2025-mfafatigue-identitysecurity-cyberinsurance-dataprotection-fido2-managedsecurity-zerotrust-businesscontinuity-northamericacyber","tag-cybersecurity-near-me","tag-it-services-near-me"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/posts\/651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/users\/217"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/comments?post=651"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/posts\/651\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/media\/652"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/media?parent=651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/categories?post=651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/piscataway-nj-1178\/wp-json\/wp\/v2\/tags?post=651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}