How safely users register, reset, replace, and recover authenticators without creating a help-desk bypass risk.
Legacy Exposure0%
Whether old protocols, unmanaged service accounts, token weaknesses, and logging gaps create MFA bypass paths.
Governance & Human Risk0%
Policies, metrics, training, testing, and ownership that keep MFA controls effective after rollout.
How this MFA readiness score works
This tool uses a 100-point weighted checklist to estimate how mature an organization’s MFA program is. It gives more value to broad enforcement, phishing-resistant methods, administrator protection, safe recovery flows, legacy protocol reduction, monitoring, and governance.
Score bands
0–39: High exposure — urgent MFA coverage and bypass-risk work needed.
40–59: Basic maturity — MFA exists but weak methods or gaps remain.
60–74: Developing maturity — good progress with remaining high-risk areas.
75–89: Advanced — strong program with targeted improvements.
90–100: Phishing-resistant ready — maintain, test, and continuously improve.
Privacy note
The checker runs in the visitor’s browser. It does not send answers to Cybersecurity Time, your WordPress database, or any external API.
Phishing-resistant MFA uses cryptographic authentication methods, such as passkeys, FIDO2/WebAuthn security keys, smart cards, or certificate-based authentication, to reduce fake login pages, stolen codes, push fatigue, and real-time proxy attacks.
Is SMS MFA phishing resistant?
No. SMS is better than password-only access, but it can be exposed to phishing, SIM swap, interception, and social engineering. This checker treats SMS as a low-maturity method and recommends stronger options.
Does this checker store visitor answers?
No. Scoring runs locally in the browser. The plugin does not store or transmit visitor answers unless you separately add your own contact form or analytics outside this plugin.
Is this a formal security audit?
No. It is an educational readiness tool for awareness, prioritization, and planning. A formal audit requires evidence review, interviews, configuration validation, and environment-specific testing.
Built by Cybersecurity Time as an educational readiness tool. It is not a formal audit, legal opinion, or compliance certification.
Phishing-Resistant MFA Readiness Checker
Phishing-Resistant MFA Readiness Checker helps you check whether your MFA is truly protecting your accounts or only giving basic security.
Many businesses use MFA, but weak methods can still be attacked. SMS codes can be stolen, push approvals can be misused, and weak recovery settings can let attackers bypass strong login controls.
Why This Tool Helps
Not all MFA is equal. SMS is better than no MFA, but passkeys, FIDO2 security keys, and WebAuthn-based login offer stronger phishing-resistant protection.
This checker reviews important areas such as MFA coverage, app-based MFA, passkeys, FIDO2, admin protection, recovery flows, human-risk awareness, and legacy login exposure.
What to Fix First
Start with your most important accounts: email, WordPress admin, hosting, domain registrar, cloud tools, finance systems, and administrator accounts.
Then reduce SMS dependency, improve recovery rules, disable old login methods, and train users not to approve suspicious MFA prompts.