With over 15 billion stolen credentials to work with, cybercriminals can hijack accounts, discover company secrets, compromise personal information and health care records, and steal virtually any high-value digital asset. To help deter cybersecurity disaster, more and more organizations rely on Multi-Factor Authentication (MFA). Now, there's a single source, vendor-neutral guide to today's leading MFA technologies, applications, best practices, and operations. Enterprise security experts James Hill and Ned Zaldivar reveal how MFA can prevent identity theft, unauthorized remote access, and other attacks, and guide you through configuring, operating and troubleshooting popular solutions across multiple use cases. You'll find proven techniques for integrating MFA into your current environment, leveraging MFA standards, using SMS and push notifications, and much more. A full chapter on biometrics introduces password-less systems, behavioral biometrics, WebAuthn, TouchID, and FaceID. Hill