← All insights Insights

MFA: The One Upgrade That Stops Most Account Takeovers — and How to Roll It Out Without the Pushback

Here’s an uncomfortable truth: at some point, one of your team’s passwords will be stolen, guessed, or leaked in a breach somewhere else. You can’t fully prevent it. What you can do is make a stolen password useless on its own — and that’s exactly what multi-factor authentication (MFA) does.

MFA is widely regarded as the single most effective step a business can take against account takeover. So why doesn’t every business have it everywhere? Usually one reason: the fear that staff will find it annoying. Here’s how to roll it out so they don’t.

Where to turn it on first

Don’t try to enable MFA everywhere overnight. Work in priority order:

  1. Email accounts — the master key; password resets for everything else land here.
  2. Remote access — VPNs and remote desktop, a favourite target.
  3. Administrator accounts — the keys to the kingdom.
  4. Financial and banking tools — anything that moves money.
  5. Everything else — your remaining business applications.

Choose the right method

Not all MFA is equal:

  • Authenticator apps (a code or prompt on a phone) are a solid default.
  • Passkeys or hardware security keys are the strongest option and resist phishing.
  • SMS text codes are better than nothing, but the weakest choice — avoid them for sensitive accounts.

Rolling it out without the groans

This is where the friction is won or lost:

  • Phase it. Roll out team by team, not all at once.
  • Start at the top. When leadership and IT go first, it signals this isn’t optional busywork.
  • Explain the why. A two-minute explanation — “this stops criminals using stolen passwords” — turns a chore into something that makes sense.
  • Give a simple how-to. A one-page guide with screenshots removes most of the support tickets.
  • Use “remember this device” sensibly. On trusted company devices, staff won’t be prompted every single time — which removes the biggest complaint.
  • Plan for lost phones. Have a clear, secure recovery process in place before someone needs it.

Handling the common objections

  • “It slows me down.” On a trusted device, it’s a tap every few weeks — not every login.
  • “I don’t have my phone.” Provide backup codes or a second method during setup.
  • “We’re too small to need this.” Automated attacks don’t check your size. MFA is exactly the kind of low-cost, high-impact control a small business should prioritize.

The bottom line

MFA is rarely the thing people are excited about — and almost always the thing that would have stopped the incident. A short, well-communicated rollout pays for itself the first time a stolen password hits a wall.

If you’d like help rolling out MFA across your business properly, get in touch — it’s one of the first things we put in place.

Have a question about your security?

We're happy to help — book a no-obligation consultation with our team.

Talk to us