MFA Isn’t Enough—Make It Phishing‑Proof

Attackers evolved. Your MFA must, too.

The Playbook: Make MFA Phishing-Resistant

Turn Push into Proof

  • Enable number matching in Microsoft Authenticator (Authentication Methods › Policies).
  • Show app name + location for context.

Combine with Conditional Access

  •  Require MFA with number matching for interactive logins.
  •  Block legacy protocols (IMAP/POP).
  •  Restrict by compliant devices, trusted locations, and Risk (User / Sign-in.

Go Passwordless (FIDO2 / Authenticator)

  • Register FIDO2 keys or Authenticator app.
  • Bind identity to device.
  • Optionally add certificate-based auth with Intune.

Harden the Gaps

  • Token Theft: endpoint protection, token binding, CAE.
  • OAuth Consent: admin consent only, scope limits.
  • Enrollment: strong ID verification + alerts.
  • Helpdesk: enforce step-up verification for resets.
Binding identity to device and applying Conditional Access creates a phishing‑resistant, policy‑aware gate.

MFA Method Strengths

MethodPhishing ResistanceNotes
SMS / Email OTPVery LowSIM swap & phishing risk
Voice Call OTPVery LowSpoofable, hijack risk
TOTP (Apps)LowBetter than SMS; still phishable
Push (Approve/Deny)Low–ModerateSusceptible to fatigue attacks
Push + Number MatchingModerate–HighRaises bar, stops blind approvals
App Context + GeoModerate–HighAdds visibility for suspicious logins
FIDO2 Hardware KeysVery HighDevice-bound, anti-phishing
Platform BiometricsVery HighStrong when device-bound
Smart Cards / CBAVery HighHardware-bound; mutual TLS
Passwordless (FIDO2/App+Biometric)Very HighMost robust option

Don’t Just Check the Box—Change the Outcome

Attackers exploit human habits and protocol gaps. Basic MFA slows them down. Phishing-resistant MFA stops them.

If you remember only one thing:
Turn on number matching and start your passwordless/FIDO2 rollout now.