FCI
User Security
User Security

Every identity verified, every login logged, every access decision enforced — not optional, not risk-based.

Phishing-resistant MFA, federated identity, single sign-on, cloud access security, and complete authentication logging — applied to every user across your distributed environment. From onboarding to offboarding, no gaps in between.

40,000+
users under management
400+
financial services environments
30+
years serving financial services

Not all MFA is created equal — and the wrong kind creates a false sense of security.

Most firms believe they are protected because they "have MFA." But MFA is not a single technology — it is a spectrum, and most of what firms deploy today is vulnerable to the exact attacks regulators are warning about. The difference between standard MFA and phishing-resistant MFA is the difference between a lock that can be picked and one that cannot.

The Push Notification Problem

Standard MFA — the kind most firms use — sends a push notification to the user's phone. The user taps "Approve" and they're in. The problem is that attackers exploit this exact behavior. In an MFA fatigue attack (also called MFA bombing), an attacker who already has the user's stolen credentials floods them with repeated push notifications — at 2 AM, during meetings, over and over. The user, exhausted and just wanting it to stop, taps "Approve" on a request they didn't initiate. The attacker is in.

This is not theoretical. MFA fatigue attacks were behind breaches at Uber, Cisco, Okta, and other major organizations. The Uber breach in September 2022 happened exactly this way — a Lapsus$ attacker bombarded an employee with push notifications until they approved one.

The Core Vulnerability

Standard push-notification MFA lets a user approve an authentication request they did not initiate. The user does not need to see the attacker's screen, verify any context, or take any deliberate action beyond tapping a button. One tap of "Approve" — whether intentional or out of fatigue — grants full access.

Why CISA Requires Phishing-Resistant MFA

CISA — the Cybersecurity and Infrastructure Security Agency — does not consider push notifications, SMS codes, or standard one-time passwords to be phishing-resistant. In its Zero Trust guidance (OMB M-22-09), CISA mandates phishing-resistant authentication and identifies FIDO2/WebAuthn as the standard that meets this requirement. The reason is straightforward: phishing-resistant MFA requires a cryptographic handshake between the user's device and the specific service being accessed. It cannot be intercepted by a proxy, it cannot be socially engineered through notification fatigue, and it cannot be replayed by an attacker who captures a code.

What Phishing-Resistant MFA Looks Like in Practice

Instead of a simple push notification that can be approved without thought, phishing-resistant MFA requires the user to take a deliberate, verifiable action. For example: the user sees a number on their login screen and must type that exact number into their authenticator app — not just tap "Approve." After that, biometric re-authentication (fingerprint or face) confirms it is actually the person holding the phone. This is number matching plus biometric verification.

The user cannot accidentally approve a request they did not initiate, because they would need to see the number on the attacker's screen — which they cannot. It takes two more seconds than tapping a button. It stops the entire category of fatigue attacks.

"Enabling MFA is not the same as enforcing phishing-resistant MFA. One gives you a checkbox. The other gives you actual protection. CISA does not consider push notifications, SMS, or standard OTP codes to be phishing-resistant — and neither should your firm."

When your authenticator is made by the same company as the system being attacked, you have a single point of failure.

Most firms use Microsoft Authenticator to protect Microsoft 365. On the surface, this makes sense — it's included, it's convenient, it integrates natively. But from a security architecture perspective, it creates a dangerous concentration of risk. If Microsoft's authentication infrastructure is compromised, the tool you depend on to verify identity is compromised at the same time.

The Token Theft Problem

Token theft accounted for 31% of Microsoft 365 breaches in 2025, making it the single largest attack vector against M365 — surpassing even traditional credential theft. In an Adversary-in-the-Middle (AiTM) attack, the attacker sets up a phishing page that acts as a real-time proxy between the user and Microsoft's actual login page. The user enters their credentials and completes MFA normally — through Microsoft Authenticator — and the login succeeds. But the attacker, sitting between the two, captures the session token that Microsoft issues after authentication. With that token, the attacker accesses the user's Outlook, OneDrive, Teams, and SharePoint — without ever triggering another MFA prompt.

31%
of M365 breaches from token theft (2025)
146%
rise in AiTM attacks (2024)
50%+
AiTM campaign success rate (Proofpoint 2025)

The AuthQuake Vulnerability

In December 2024, Oasis Security disclosed "AuthQuake" — a critical vulnerability in Microsoft's MFA implementation that allowed attackers to brute-force MFA codes with unlimited attempts, no rate limiting, and no user notification. An attacker could bypass MFA in under 70 minutes with a greater than 50% success rate. The vulnerability affected every Microsoft account protected by authenticator-app-based MFA — Outlook, OneDrive, Teams, Azure Cloud. Microsoft had more than 400 million paid Office 365 seats exposed before the fix was deployed. The attack required no user interaction. The user never knew it was happening.

FCI's Approach: Divide to Better Secure

FCI does not use Microsoft Authenticator. Instead, FCI deploys a separate, independent authentication provider — outside the Microsoft ecosystem entirely. The principle is straightforward: do not put all your eggs in the same basket. If Microsoft's identity infrastructure is the target — and it demonstrably is — then the tool that verifies identity should not also be a Microsoft product. By separating the authenticator from the system it protects, FCI ensures that a compromise of one does not automatically compromise the other.

Microsoft Authenticator: Convenience, But Concentrated Risk

The credentials, the MFA verification, the session tokens, and the authentication logs all flow through Microsoft's infrastructure. When attackers target Microsoft — through AiTM phishing, OAuth device code abuse, or token theft — they are attacking the same ecosystem that is supposed to be verifying the user's identity. A breach of one layer exposes every layer.

Independent Authenticator: Separated by Design

FCI uses an authentication provider that operates outside the Microsoft ecosystem. The MFA challenge is issued by a different provider, verified by a different provider, and logged by a different provider. Even if an attacker compromises Microsoft's token infrastructure, the authenticator's security boundary is untouched. The entity verifying security should never be the same entity being verified.

"Microsoft is the most targeted identity platform in the world. Using Microsoft Authenticator to protect Microsoft 365 means the lock and the key are both made by the company under attack. FCI separates them — by design, not by accident."

Most firms cannot prove who accessed what, when, or how.

Financial services firms operate in an environment where every user is both a productivity asset and an attack surface. Regulators require that firms control who has access, verify that users are who they claim to be, and log every authentication event. Most firms believe they have this covered because they turned on MFA. The reality is different. MFA is often risk-based rather than enforced, federation and single sign-on are confused or misconfigured, and authentication logs are incomplete — or simply not captured at all.

The result is an identity layer that looks secure on paper but fails under scrutiny. When an examiner asks for proof of who logged into what system, when, and from where — or when a breach investigation needs to trace lateral movement — the gaps become visible.

MFA That Isn't Actually Enforced

Most firms enable MFA but configure it as risk-based — meaning Microsoft decides when to challenge the user based on its own risk assessment. If the login looks "normal" to Microsoft, MFA is skipped. The firm believes every login is verified. It isn't. And there's no log showing when MFA was bypassed because the system decided it wasn't needed.

Federation, SSO, and MFA Conflated

These are three different technologies that serve three different purposes. Federation syncs usernames between systems. Single sign-on eliminates repeated authentication. MFA verifies the person. Most firms — and even many IT providers — conflate them. The result is misconfigured identity infrastructure where gaps exist that no one recognizes because the terminology itself is misunderstood.

Incomplete Authentication Logging

Microsoft's native authentication logs capture basic events but miss critical context. Risk level, device location, authentication method, login source country — this information exists but is not captured by default. Without extended logging, a firm cannot answer the questions regulators and forensic investigators will ask.

No Lifecycle Visibility

Users are added when they join. But who tracks inactive accounts? Who detects anomalous behavior? Who ensures that when someone leaves, every access point is actually closed — not just the obvious ones? Most firms have no systematic process for user lifecycle management. Orphaned accounts accumulate, and each one is a door that should have been locked.

The Question Every Firm Should Ask

Can you prove — for every user, every login, every application — who accessed it, when, how they were authenticated, and whether the access was appropriate?

Six capabilities — applied to every user, enforced continuously.

FCI does not rely on Microsoft's default authentication behavior or trust that MFA is "probably" being enforced. FCI builds a complete authentication ecosystem — federation, single sign-on, CASB, and advanced MFA working together — so that every access decision is verified, logged, and provable. Every capability below is enforced through templates and automation, not configured once and assumed to be working.

01
Phishing-Resistant MFA
Advanced MFA enforced on every login — not risk-based, not optional. FCI implements CISA-recommended phishing-resistant MFA as a mandatory control. Number matching requires the user to type a code they see on the login screen into their authenticator, followed by biometric re-authentication. Microsoft's risk-based approach decides for itself when to challenge a user; FCI's approach removes that decision. Every login is verified. Every time.
02
Federation & Identity Sync
Federation syncs user identities across systems so that credentials are managed centrally. When Salesforce, Sophos, or any integrated application lets a user "log in with Microsoft," that's federation — the identity has been synced so the user doesn't need a separate set of credentials for every system. FCI configures and manages federation across all integrated applications.
03
Single Sign-On (SSO)
SSO is a different technology from federation — it eliminates repeated authentication across integrated systems within a session. Once a user has been verified, they move between applications without re-authenticating. FCI implements SSO alongside federation so that security and usability work together, not against each other.
04
Cloud Access Security Broker (CASB)
CASB controls verify the user, the device, and the network before granting access to cloud applications. A valid login is not enough — the device must be trusted, the network must be known, and the user's risk profile must be acceptable. FCI implements CASB policies that enforce these conditions on every access attempt, creating a Zero Trust verification chain.
05
Extended Authentication Logging
FCI extends authentication logging beyond Microsoft's native capabilities to capture the full context of every login event. Every authentication event is ported to centralized logs and stored. This is the evidence that regulators and forensic investigators need — and that Microsoft does not provide by default.
Login Time Result User Application Risk Level Device Location Auth Method Source Country
06
User Lifecycle Management
FCI manages the full user lifecycle — from CISO-approved onboarding through active monitoring to decommissioning. Inactive users are detected and flagged for cost reduction and risk mitigation. User anomalies are identified through behavioral monitoring. A complete user inventory is maintained, and every change is logged. When a user leaves, every access point is closed — not just email.

Securing mobile access without invasive MDM.

Traditional Mobile Device Management has significant problems in a BYOD environment. Users report battery drain, restricted functionality, and a surveillance-like experience on their personal device. MDM platforms are costly to license and complex to administer. For most financial services field offices, the tradeoff isn't worth it.

FCI's Approach: User-Remediated Security at Conditional Access
Instead of installing a management agent on every personal phone, FCI enforces security at the point of access. Before a smartphone or tablet can reach the firm's cloud environment — email, files, applications — the device must meet defined conditions: OS current, screen lock enabled, no jailbreak detected. If the device doesn't comply, the user is told exactly what to fix and access is blocked until they do. The user remediates on their own device, on their own terms. No agent. No surveillance. No corporate control over personal data. The firm gets the security posture it needs, and the user keeps the privacy they expect.

Four reasons the same tools produce different results.

Every managed service provider can turn on MFA. The difference between FCI and everyone else is not the tools — it is mastery of the authentication ecosystem, automation that replaces manual identity management, consistency across every user and every access point, and persistent proof that every login is verified and logged.

What Sets FCI Apart
Enabling MFA is not identity security. Configuring federation is not enforcement. FCI delivers both.
Expert Mastery
FCI has deployed federation, CASB, and advanced MFA across hundreds of financial services environments. That exposure means FCI knows the difference between federation and SSO, knows why risk-based MFA creates gaps, and knows which CASB policies actually matter for regulatory compliance. What FCI learns in one environment hardens every environment.
Automated Procedures
Manual identity management fails because humans forget to disable accounts, skip federation configuration for new applications, and cannot keep up with the pace of Microsoft's authentication changes. FCI automates user provisioning, deprovisioning, and policy enforcement through templates. Identity controls are not configured once and hoped for — they are enforced continuously.
Consistent Controls
Protecting some users is not protection. FCI covers every user, every application, every login — no gaps, no exceptions, no "we'll add MFA to that system later." Contractors, employees, BYOD users — all under the same authentication standard.
Persistent Proof
It is easy to show an auditor that MFA is enabled today. FCI produces evidence that every login was verified, every day, with full context. Authentication logging that captures risk level, source country, device location, and method used — not just "login succeeded." Point-in-time compliance is a byproduct of persistent enforcement, not a scramble.

"FCI does not trust that Microsoft's risk-based decisions are protecting the firm. Every login is verified. Every authentication event is logged with full context. The firm can prove who accessed what, when, and how — not because someone checked a box, but because the controls enforce it automatically."

User security does not stand alone — it gates access to everything else.

A verified identity is not just a login event. It is the access decision that determines whether a user reaches the endpoint, the network, the data, and the cloud applications. Every domain protects every other domain — and user security is the gatekeeper that makes the rest enforceable.

The Principle
No single domain failure defeats the system. A compromised credential is stopped by the endpoint check. A compromised endpoint is contained by the network. Every layer reinforces every other layer.
Endpoint Security
A trusted device becomes a factor in user authentication. The authentication chain verifies not just who the user is, but whether they're on a known, managed endpoint before granting access.
Network Security
Always-on VPN ensures the user connects from a known IP. User authentication and network verification work together — a valid identity from an unknown network triggers additional scrutiny.
Cloud App Security
CASB policies tie directly to user identity. Access to M365 and other cloud applications is gated by the authentication ecosystem — user verified, device trusted, network known.
Data Security
User permissions determine who can access, modify, and export data. Without verified identity, data classification and DLP controls have no anchor — they don't know who is accessing the data.
Firm Security
Every authentication event feeds the FCI Portal. The security officer has visibility into login patterns, anomalies, and user lifecycle changes across the entire environment.

Evidence that builds itself — every day, not just on audit day.

Regulators, home offices, and cyber insurance carriers all ask the same question: can you prove who has access and how they were authenticated? FCI produces continuous evidence as a byproduct of how it operates. There is no scramble before an exam. The proof already exists.

Authentication Verified
Proof that every login across every application was verified by phishing-resistant MFA — not risk-based, not optional. Evidence of method used, device context, and login source.
Access Controlled
Proof that CASB policies enforced Zero Trust conditions on every access attempt — user verified, device trusted, network known. Evidence of denied access when conditions were not met.
Lifecycle Managed
Proof that user accounts are provisioned with CISO approval, monitored for inactivity and anomalies, and decommissioned when no longer needed. Complete user inventory with full history.
Compliance Documented
Extended authentication logs that answer every question a regulator will ask: who, what, when, where, how, and whether the access was appropriate. Stored centrally, retained beyond Microsoft's native limits.
Independence Proven
Authenticator operates outside the Microsoft ecosystem — separate verification, separate logs, separate security boundary. No single point of failure in the identity chain.
FCI Portal Visibility
The security officer can access user evidence at any time — login patterns, anomalies, lifecycle changes, and the ability to go back to any point in time.
FINRA SEC NAIC State Regulators Cyber Insurance Home Office Compliance

What Your Examiner Will See

Exactly who has access, how every login was verified, which authentication method was used, and whether the controls are enforced continuously — not just on the day you knew they were coming.

Ready to close the identity gaps your firm can't see?
FCI implements the authentication ecosystem that most firms think they already have — and produces the evidence to prove it. Start with a gap analysis — it is free, takes 30 minutes, and commits you to nothing.
Phone
973-227-8878
Web
fcicyber.com