Implementing MFA with Solutions in a Public Institution

Discover how a public sector institution enhanced its cybersecurity by implementing’s advanced Multi-Factor Authentication (MFA) solutions, significantly reducing phishing-related breaches and improving user experience.

Updated on


In 2023, a public sector institution providing essential services faced increasing cybersecurity threats, including a spear phishing attack. To protect its information resources and improve user authentication security, the institution sought a robust Multi-Factor Authentication (MFA) system.


The institution faced several key challenges:

  • Phishing Attacks: The organization experienced targeted phishing attempts aimed at compromising user credentials.
  • User Resistance: Staff were resistant to using personal devices for work, and the institution did not issue company mobile phones broadly.
  • Device Management: The institution preferred to avoid using additional hardware authenticator keys that users and IT staff would need to manage.

The Road to FIDO: Enabling a Better User Experience

The institution evaluated several MFA methods before choosing FIDO Authentication. They initially considered using existing HID cards for MFA, but these older cards could not be repurposed for computer resource access. Through research, the institution discovered that FIDO Authentication could be integrated with their current infrastructure.


The institution adopted’s FIDO2 Fingerprint Security Keys. These keys offered a secure and user-friendly solution by combining biometric verification with FIDO2 standards and supporting multiple connection methods (USB, NFC, Bluetooth).

Implementation Process

  1. Needs Analysis:

    • Conducted an assessment of existing vulnerabilities and identified key security requirements.
    • Evaluated user experience to ensure the solution met practical needs.
  2. Supplier Selection:

    • Selected for their comprehensive security key solutions that align with FIDO standards, ensuring broad compatibility and support.
  3. Technical Integration:

    • Integrated FIDO2 technology into existing systems, with necessary adjustments to backend infrastructure and frontend user interfaces.
    • Conducted extensive testing to ensure system stability and user satisfaction.
  4. User Training and Promotion:

    • Educated users through detailed guides, email campaigns, and online tutorials.
    • Provided ongoing support for the transition to the new authentication method.

Results and Impact

  • Enhanced Security: The implementation led to a significant reduction in phishing-related breaches and unauthorized access incidents.
  • User Confidence: Staff reported higher confidence in the institution’s digital security measures.
  • Improved User Experience: Streamlined login processes and reduced average login times, enhancing overall user satisfaction.

Lessons Learned

  • Continuous Improvement: Regular updates and user feedback are crucial for maintaining high security standards.
  • Effective User Education: Clear communication and comprehensive training are essential for smooth transitions to new security measures.

Thetis Security Keys