• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security

CISA Adds Single-Factor Authentication To List of Bad Practices

CISA has added the use of single-factor authentication for remote or admin access to its list of "Bad Practices."

August 30, 2021 Alyssa Borelli Leave a Comment

CISA Software Security
Tada Images/ Stock.adobe.com

The U.S. Cybersecurity & Infrastructure Agency (CISA) has added the use of single-factor authentication for remote or administrative access to its list of “Bad Practices” of exceptionally risky cybersecurity practices.

Single-factor authentications is a common low-security method of authentication that only requires matching one factor, such as a password to a username to gain access to a system.

CISA advises all organizations to avoid single-factor authentication. For organizations that support critical infrastructure, this method is especially dangerous.

Recent incidents have proved cyberattacks against critical infrastructure can have significant impacts on national security, economic stability, life, health, and safety of the public — all critical functions of the government and private sector.

The first bad practice on CISA’s list is the use of unsupported (or end of life) software in services of critical infrastructure organizations.

An example of this is the 2017 WannaCry incident — a global ransomware attack that spread through computers using Microsoft Windows.

About 300,000 computers around the globe and across almost every economic sector were impacted. User’s files were held hostage and a Bitcoin ransom was demanded for their return.

For some organizations, updates can be timely, difficult, and costly. Patching systems and implementing updates can result in downtime, which some critical infrastructure organizations don’t want to lose.

The second bad practice is the use of known/fixed/default passwords and credentials “[Default passwords are] dangerous and significantly elevates risk to national security, national economic security, and national public health and safety,” says CISA in a blog post.

Easily guessable passwords can be easily cracked. Hackers can use a spraying technique to gain access to as many accounts as possible causing anywhere from minor security incidents to major breaches.

CISA says this is only the beginning of the list of bad practices and intends to release more to develop a complete catalog to educate critical infrastructure owners and operators, as well as the defense industry and the organizations that support the supply chain for national critical functions.

CISA’s addition to the bad practice list can be applied to every organization — not just those organizations who provide critical infrastructure.  Cybersecurity should be a risk management priority at every organization.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: bad practices, CISA, Network Security

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.