Turning on MFA is not the same as being protected by MFA. Here's the difference โ and why most businesses are more exposed than they think.
'We have MFA turned on.' It's one of the most common things we hear when we first talk to a business about their security posture. And it's often followed by a quiet assumption: we're covered. The reality is more complicated โ and more important to understand.
Multi-Factor Authentication is one of the most effective security controls available. When properly implemented, it stops the vast majority of credential-based attacks โ which is how most breaches start. But 'having MFA' and 'having MFA that actually works' are two very different things.
We regularly find businesses where:
In each of these cases, the business believes they're protected. An attacker knows exactly where the gaps are.
Even when MFA is properly enabled, attackers have adapted. MFA fatigue (also called MFA bombing) is a technique where an attacker who already has a user's password repeatedly sends MFA push notifications to their phone โ sometimes dozens in a row. The goal is simple: wear the user down until they approve the request just to make the notifications stop.
This attack has been used successfully against large organisations including Uber and Microsoft. It works on standard push-based MFA โ the kind most businesses use. The solution is phishing-resistant MFA โ hardware security keys or passkey-based authentication that can't be intercepted or spammed.
Microsoft 365 supports Conditional Access policies โ rules that define the conditions under which a login is permitted. Think of it as context-aware security:
MFA without Conditional Access is a lock on your front door with an open window next to it.
The highest-value accounts in any Microsoft 365 environment are admin accounts โ the ones that can add users, change security settings, access all mailboxes, and reset other people's passwords. If a single admin account is compromised, an attacker can own your entire Microsoft 365 tenant in minutes.
Best practice requires that admin accounts are separate from day-to-day user accounts, protected by phishing-resistant MFA, governed by Privileged Identity Management (PIM), and monitored for unusual activity. Very few SMBs have this in place.
Ask your IT provider or internal team these questions:
If any of these answers are unclear or concerning, that's exactly where to start.
We identify your top 3 risks and tell you exactly what to fix โ no jargon, no obligation.