Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Vertex Cyber Security’s Naughty List

In this digital age, it is more important than ever to protect your accounts. The issue is that users are limited to the security options that each site offers. Key important security configurations are Strong Passwords MFA and session expiry. MFA refers to the use of two or more methods of authenticating yourself to a website.
Session expiry refers to the amount of time that a logged in user’s session remains active before they are forcefully signed out. In this article we will look at why these are both so crucial for security, and we’ve put together a short ‘naughty’ list of large-brand websites that don’t offer MFA or have overly long session expiry periods.
Phishing and weak passwords are some of the most common methods/vulnerabilities exploited by hackers. MFA makes it significantly harder for someone to hack into an account, as the attacker would need to get both the user’s password and MFA token. Overly long session timeouts can lead to issues as attacker who steal session tokens are able to use log in as the victim user for as long as the session
remains active. So, starting with MFA, while any method is better than none, which is best?


The three most common methods of MFA are SMS, authenticator apps (such as Google and Microsoft), and hardware-based tokens (such as YubiKey). We have seen attackers circumvent SMS MFA by calling
telecoms and using social engineering to get victim’s text messages and phone calls forwarded to the attacker. The main problem with authentication apps is that tokens can be phished from the user just as
passwords can. To visualise how this could play out, imagine a phishing website that first requests the victim’s username and password, then displays a prompt requesting them input the MFA token displayed
on the app. By-far the strongest method is hardware-based MFA. A unique key is generated for each registered url, so even if the victim gets tricked into plugging in and activating their MFA dongle into a
phishing website, the url will be different than the real website, and the correct token will not be sent across the network.


As for session expiry’s, it really is dependant on each individual application. Take banking for example, which usually have session expiry’s of around 15 minutes. This makes perfect sense, whereas you’d get pretty annoyed if a site like Facebook destroyed your session every 15 minutes, forcing you to log back in. As a general rule for non-critical applications, we are flagging anything about 1 month as too long for
session expiry.
Seeing as hardware-based MFA is the most secure, and overly long session times are a security issue, you’d expect all the large websites to have them, though surprisingly this isn’t the case. We’ve put
together a naughty list of companies which don’t do either of these things. Remember that this is just a quick assessment of these three aspects of cyber security, and not a full security audit or anything of the
like.

Vertex Cyber Security Naughty List 2022

LinkedInNo FIDO2 MFA
InstagramNo FIDO2 MFA
RedditNo FIDO2 MFA
MailgunNo FIDO2 MFA
DropboxNo FIDO2 MFA
MailchimpNo FIDO2 MFA
TwitterOverly long session expiry
ANZNo FIDO2 MFA
EbayNo FIDO2 MFA
Commonwealth BankNo FIDO2 MFA
FacebookOverly long session expiry
WestpacNo FIDO2 MFA
NABNo FIDO2 MFA
AirbnbOverly long session expiry
EbayNo FIDO2 MFA

We will come back and update this list as we identify more and hopefully able to remove some of these sites. Vertex Cyber Security would like to wish everyone a very safe and Merry Christmas. We will have team members available over the holiday period, so don’t hesitate to contact us if you’d like help or to talk to one of our cyber security experts.

CATEGORIES

authenticator apps - Cyber Security - Defence - MFA (multi-factor authentication) - Passwords - Phishing - Security - Session Expiry

TAGS

cyber security - hackers - MFA - multi-factor authentication - password - protect

SHARE

PrevPreviousIs ISO27001 or SOC2 Automation Platforms like Vanta and Drata good?
NextAutomatic Updates are a VulnerabilityNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.