Original release date: August 30, 2021
Today, CISA added the use of single-factor authentication for remote or administrative access systems to our Bad Practices list of exceptionally risky cybersecurity practices. Single-factor authentication is a common low-security method of authentication. It only requires matching one factor—such as a password—to a username to gain access to a system.
Although these Bad Practices should be avoided by all organizations, they are especially dangerous in organizations that support Critical Infrastructure or National Critical Functions.
CISA encourages all organizations to review the Bad Practices webpage and to engage in the necessary actions and critical conversations to address Bad Practices. For guidance on setting up strong authentication, see the CISA Capacity Enhancement Guide: Implementing Strong Authentication.
This product is provided subject to this Notification and this Privacy & Use policy.
Today, CISA issued Emergency Directive ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices…
CISA is releasing this Alert to provide guidance in response to a widespread software supply…
Today, CISA released a cybersecurity advisory detailing lessons learned from an incident response engagement following…
SonicWall released a security advisory to assist their customers with protecting systems impacted by the…
CISA released nine Industrial Control Systems (ICS) advisories on September 18, 2025. These advisories provide…
Today, CISA released a Malware Analysis Report detailing the functionality of two sets of malware…
This website uses cookies.