<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
p.xmsonormal, li.xmsonormal, div.xmsonormal
{mso-style-name:x_msonormal;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.xmsobodytext, li.xmsobodytext, div.xmsobodytext
{mso-style-name:x_msobodytext;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.xcontentpasted3
{mso-style-name:x_contentpasted3;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<div>
<div>
<p class="xmsobodytext" style="mso-margin-top-alt:12.55pt;margin-right:31.7pt;margin-bottom:12.0pt;margin-left:0in">
<span class="xcontentpasted3"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">The Cybersecurity and Infrastructure Security Agency (CISA) released a</span></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">
released two fact sheets to give IT leaders and network defenders an improved understanding of current threats against accounts and systems that use multifactor authentication (MFA), “</span><span style="color:black"><a href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf"><span style="font-family:"Franklin Gothic Book",sans-serif">Implementing
Phishing-Resistant MFA</span></a></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">” and “</span><span style="color:black"><a href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf"><span style="font-family:"Franklin Gothic Book",sans-serif">Implementing
Number Matching in MFA Applications</span></a></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">.”<span class="xcontentpasted3">
</span> </span><span style="color:black"><o:p></o:p></span></p>
<p class="xmsobodytext" style="mso-margin-top-alt:12.55pt;margin-right:31.7pt;margin-bottom:12.0pt;margin-left:0in">
<span style="font-family:"Franklin Gothic Book",sans-serif;color:black">Because not all forms of MFA are equally secure, the phishing-resistant fact sheet informs organizations and users of the threats to MFA and how to implement the most secure form of MFA.
CISA also published an infographic of the hierarchy of MFA options that is available on
</span><span style="color:black"><a href="https://www.cisa.gov/mfa"><span style="font-family:"Franklin Gothic Book",sans-serif">CISA.gov/MFA</span></a></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">, which shows phishing-resistant
MFA as the strongest choice. </span><span style="color:black"><o:p></o:p></span></p>
<p class="xmsobodytext" style="mso-margin-top-alt:12.55pt;margin-right:31.7pt;margin-bottom:12.0pt;margin-left:0in">
<span style="font-family:"Franklin Gothic Book",sans-serif;color:black">For small- and medium-size business that cannot immediately implement phishing-resistant MFA, the fact sheet on implementing number matching provides guidance for organizations to mobile
push with number matching as an interim option. While “number matching” MFA is a great interim mitigation, CISA encourages organizations to develop plans to migrate to phishing resistant MFA. </span><span style="color:black"><o:p></o:p></span></p>
<p class="xmsobodytext" style="mso-margin-top-alt:12.55pt;margin-right:31.7pt;margin-bottom:12.0pt;margin-left:0in">
<span style="font-family:"Franklin Gothic Book",sans-serif;color:black">As part of long- and intermediate-term plans to apply Zero Trust principles, CISA encourages all organizations to implement phishing-resistant MFA. CISA recommends that organizations identify
systems that do not support MFA and develop a plan to either upgrade these systems to support MFA or migrate to new systems that support MFA. </span><span style="color:black"><o:p></o:p></span></p>
<p class="xmsonormal" style="margin-bottom:8.0pt"><span class="xcontentpasted3"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">In the past year, CISA has seen bypass attacks on MFA increase and intensify. However, we only have heard
about some of these bypass attacks because the attackers went public. All organizations should share information on incidents and anomalous activity to CISA 24/7 Operations Center at report@cisa.gov or
<a href="https://www.cisa.gov/report">Report | CISA</a> and/or to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or
<a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>. </span></span><span style="color:black"><o:p></o:p></span></p>
<p class="xmsobodytext" style="mso-margin-top-alt:12.55pt;margin-right:31.7pt;margin-bottom:12.0pt;margin-left:0in">
<span style="font-family:"Franklin Gothic Book",sans-serif;color:black">CISA has updated
</span><span style="color:black"><a href="https://www.cisa.gov/mfa"><span style="font-family:"Franklin Gothic Book",sans-serif">CISA.gov/MFA</span></a></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> with this new guidance along
with the infographic. </span><span style="color:black"><o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image001.png@01D8ED1D.C1FB3550"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
</div>
</body>
</html>