How likely is an organization to have misconfigured multi-factor authentication (MFA) settings?
Very likely6%
Likely43%
Somewhat likely24%
Somewhat unlikely13%
Unlikely8%
Very unlikely3%
Unsure
582 PARTICIPANTS
3.5k views1 Upvote1 Comment
Sort by:
Content you might like
Seeking insights for research universities regarding CMMC 2.0 adoption and compliance. I'm listing our full question set below, but we would welcome insights on any or all of these:
1. What is the anticipated timeline for CMMC 2.0 adoption by the Federal Government? Any insights on the expected rollout and implementation schedule?
2. From a Higher Ed CIO perspective, what are the key operational differences between each "level" in CMMC 2.0? Are there any specific challenges or considerations especially for research universities?
3. For a research university, which CMMC level would be the most suitable target? Are there any key dates or deadlines that Higher Eds and researchers should be aware of in their compliance journey?
4. What are the most crucial features or elements of CMMC that universities need to achieve compliance? Any recommendations or best practices?
5. Specifically, are there any requirements in CMMC for 7/24/365 "eyes on glass" network and/or endpoint monitoring? If there is an endpoint requirement, does it extend to all servers and laptops issued by the university, or is it limited to hosts involved in research grants? What is expected to demonstrate compliance in this regard?
6. Apart from CMMC compliance, are there other considerations or or strategies to consider when seeking to qualify for/reduce cyber risk insurance costs?
What are the biggest technical challenges preventing organizations from being able to use their existing data to enable digital transformation?
Finding data and putting it to good use13%
Controlling the security and privacy of data45%
Understanding how data is currently being used20%
All of the above19%
None of the above1%
Does anyone have recommendations for risk management background services for a large technology consulting company? The employee count is over 20K.
Are CISA's current recommendations for preventing Maui ransomware attacks sufficient?
Yes, if followed correctly.39%
Unsure38%
No, there is still a significant risk.19%
Other (please tell us in the comments)3%
The "basics" of MFA are usually straightforward and not very challenging to get right. The challenging part is what happens next, I often refer to it as "operationalizing" security - driving adoption and awareness, providing training, controlling configuration drift, etc.