Here’s some stats for you:
This type of protection seems like a no-brainer, right? Unfortunately, 78% of Microsoft 365 admins do not have MFA enabled (source). When you consider that many of those not required to use MFA have access to sensitive information and data within an organization, it sounds almost absurd. But the statistics speak for themselves–in general MFA is not being used to its full capabilities.
According to Microsoft, 89% of employees have not been activated. It begs the question, is using MFA not important?
Let’s answer that simply here: yes, MFA is very important. It’s the single greatest proactive security measure your organization can take. Every month, 1.2 million Microsoft 365 accounts are breached and 99.9% of breaches do not have MFA.
It’s not difficult to breach accounts that don’t have MFA activated–in many cases, attacks are even successful without the use of advanced technology. Without MFA, cyber actors can be successful with one compromised credential or one legacy application to initiate a data breach. The importance of password security and two-factor authentication (MFA) cannot be overstated enough.
So why aren’t people using MFA all the time? There are a couple of key roadblocks to MFA adoption which can all be easily overcome at your organization:
Both of these statements are untrue. Overcoming these misconceptions is key to MFA adoption.
And lastly, we’ll leave you with this important reminder: do not just assume your MSP is taking care of these details (if you’re working with PK Tech, you can rest assured we are!). Know the right questions to ask.
Ready to get in touch with us? Contact PK Tech here.