Key takeaway

Where MFA is heading now: less push fatigue, more phishing resistance, stronger policy design, and better user experience.

Overview

Multi-factor authentication is still essential, but the standard has changed. The real question is no longer whether a business has MFA turned on. It is whether the business is using the right kinds of factors, the right policies, and the right fallback paths for today's attacks.

The strongest current direction is clear: move away from easy-to-phish prompts and weak password habits, and move toward phishing-resistant authentication, trusted devices, biometrics tied to hardware, and context-aware access decisions.

1. Push-spam attacks changed the MFA conversation

One of the biggest recent pressures on MFA has been push fatigue, sometimes called push-spam or MFA bombing. Attackers repeatedly trigger prompts until a user finally approves one, or they pressure the user through social engineering while the prompts are arriving. That has pushed many organizations to rethink simple push approval as a default control.

  • Use number matching or phishing-resistant factors instead of basic one-tap approvals wherever possible.
  • Prioritize stronger MFA for administrators, email, finance, HR, and remote access first.
  • Monitor repeated prompt activity as a sign of account pressure or credential abuse.

2. Phishing-resistant MFA is becoming the target state

Passkeys, FIDO2 security keys, and other phishing-resistant authenticators are moving from advanced option to strategic baseline. They help block the common problem where a user is tricked into entering credentials or approving a login on a fake site. For many businesses, that is the most important shift in MFA right now.

Modern identity platforms such as Okta now center this approach. Okta FastPass is a good example: it combines device trust, biometric checks, and risk-aware policies to reduce reliance on passwords and weak push prompts. For businesses that already use Microsoft Entra or another identity stack, the same design principle still applies: push the organization toward phishing-resistant sign-in for the highest-risk accounts and applications.

3. Biometrics are strongest when tied to a trusted device

Biometric authentication is becoming more common because it improves both security and convenience when implemented correctly. Fingerprint and face authentication can remove friction for employees, but biometrics are not a stand-alone magic answer. Their strongest use is local unlock or activation of a trusted hardware-backed authenticator.

That means pairing biometrics with device trust, secure hardware, and a clear fallback path. If someone injures a finger, changes devices, or cannot use a biometric method, access recovery needs to be strong and well controlled rather than improvised.

4. Location is now a risk signal, not a security strategy by itself

Location still matters, but not in the simplistic way many teams used it a few years ago. A login from an unfamiliar region, cloud-hosted IP range, or unusual network can be useful context. It can trigger step-up authentication, session review, or stricter access policies.

Avoid treating location alone as proof of trust. VPNs, roaming users, mobile networks, and cloud infrastructure make location imperfect. The stronger pattern is to combine location with device posture, user behavior, IP reputation, session risk, and application sensitivity.

5. Password quality still matters because passwords are not gone yet

Even when the long-term goal is passwordless access, most businesses still operate in mixed environments. Legacy SaaS apps, shared vendor tools, support portals, and older internal systems still depend on passwords. That means weak password habits still create exposure, especially when credentials are reused or sprayed across services.

  • Use long, unique passwords or passphrases for every remaining password-based account.
  • Remove reused passwords from admin, finance, and email access first.
  • Treat phishing-resistant MFA as the direction of travel, but keep password policy disciplined during the transition.

6. Password managers still help, but they are not the whole answer

Password managers are still one of the strongest practical tools for improving password quality. They make it far easier to use long, random, unique passwords at scale, and they help surface weak or reused credentials. For businesses with many SaaS accounts, that is still valuable.

Their weaknesses are mostly operational, not conceptual. If the master credential is weak, if a device is compromised, if sensitive shared accounts are poorly governed, or if browser-based autofill is used carelessly, a password manager can still become part of the attack path. Treat password managers as one control inside a broader identity program, not as the program itself.

  • Use a strong master passphrase and protect the vault with MFA.
  • Prefer enterprise password-management controls for shared accounts, offboarding, and auditing.
  • Reduce the number of high-risk accounts that still depend on passwords at all.

7. How businesses can roll out stronger MFA without creating chaos

The cleanest rollout starts with an access inventory, not with a random new app prompt. Leadership needs to know which systems matter most, which users hold the most risk, which factors are already in use, and where weak prompts or shared credentials still exist.

  • Start with administrator accounts, email, finance systems, HR systems, and remote access.
  • Choose a clear identity platform path, such as Okta or Microsoft Entra, and standardize factors rather than mixing too many exceptions.
  • Use phishing-resistant authenticators wherever technically possible and reserve weaker options for temporary or low-risk edge cases.
  • Create recovery, break-glass, and help-desk processes before the rollout gets large.
  • Train users on push-spam, fake login pages, and the difference between real step-up prompts and suspicious ones.

How Cherry Pi Solutions helps

Cherry Pi Solutions helps businesses move from fragmented MFA to a stronger identity and access model. We assess the current environment, identify weak points in factors and policy design, and build a practical rollout plan that strengthens security without slowing operations down.

  • Review the current MFA stack, password exposure, and privileged-access paths.
  • Design a rollout plan for phishing-resistant MFA, passkeys, or platform-based authenticators.
  • Help implement solutions such as Okta or Microsoft identity controls in a way that matches the business.
  • Support training, recovery planning, and operational handoff so the controls hold up after launch.