Having 2FA is recommended. But just FYI, even RSA SecID was subject to Chairman's hack attack.:
www.fox-it.com
RSA has issued a statement for this:-
Summary RSA Engineering reviewed a report from Fox-IT titled “Operation Wocao: Shining a light on one of China’s hidden hacking groups”, dated Dec 17, 2019. RSA considers the scenario presented by the report to be against recommended deployment practices rather than a security vulnerability...
community.rsa.com
Everything in the software domain is hackable. but,
When enemy strikes we are not supposed to make them have a cake walk over our software infrastructure.
If humans can make it , humans can hack it . It's all about the reduction in the "probability figure" in terms of vulnerability. Having multi layered security is key , it buys time for response and counter measures.
any hacker needs entry points and pre-requisites to start hacking any system. These measures makes it difficult for hackers to start with their attacks. Without the stricter protocols ( software + physical ) in place these bloody Chicoms can go on an rampage, but if we follow stricter rules they will have a hard time even hacking into 1 system ( I am not saying they will not be able to hack)
Protocols will keep coming - RSA , Kerberos , TLS ..etc etc - Our agencies should work relentlessly to identify tougher versions of these protocols and implement them asap.
Time is every thing. Stronger Software Security buys you TIME.
Personally speaking, I am glad finally someone talked about RSA . in all the military talks- from SAMs , AAMRAMs, BMDs, ADs , PESA to AESA to secure datalinks - are these small software protocols which makes them a reality. Thats how Harware communicate with each other.
a good read on what the CIA is doing these days