Passwords Get You In. MFA Keeps Others Out.
Why Multi-Factor Authentication Matters
Even When You Think Your Passwords Are 'Good Enough'
Written by Tyson Wilcox
In our last article, we talked about password reuse and how it turns old, forgotten accounts into a present-day risk. This leads us naturally into another important security question:
If passwords are so vulnerable, why are they still the primary way we protect online accounts—and what actually helps when they fail?
The answer is multi-factor authentication, or MFA.
The Underlying Problem with Passwords
Imagine for a moment that you just bought a brand new house. You smile proudly as your real estate agent hands you your keys and you step inside. The keys mark you as the person authorized to enter the home. You can lock up when you leave to keep things safe and know that you can get in any time, day or night, by using your keys. Keys are extremely convenient and ensure we can access what belongs to us when we want access. But what happens when someone makes a copy of your key? Your house doesn't know that it isn't you holding the key. For that matter, if keys alone are what prove authorized access, then it may not be immediately obvious whether the person entering your home with a stolen key doesn't actually have authorization to be there. You need something more to prove ownership of your house. We have this solution in the form of a deed of ownership. The deed marks your property location and identifies you as the owner of the home.
Multi-Factor Authentication acts in a similar fashion. Your password starts the process of accessing your online account, but a challenge is presented to require further proof of your identity. Let's take a moment to talk about the three categories used to prove identity in online accounts:
- Something you know (a password)
- Something you have (a phone, a security key, or an app)
- Something you are (biometrics like a fingerprint or retinal scan)
True multi-factor authentication requires factors from at least two of the three categories above. A single password is not MFA. Two passwords are not MFA. A password plus a one-time code is MFA because it combines something you know with something you have. Since most real-world attacks involve stolen passwords, this distinction acts as a second layer of protection to keep criminals out.
Why Passwords Alone Aren't Enough
Think back to our example of the house keys earlier in the article. There was a time when keys alone were sufficient to protect your home. Replicating keys requires sophisticated equipment that was difficult to obtain, and the people who had such equipment were vigilant in safeguarding access. Today, there are entire kiosks available in your grocery store that can make copies of just about any key out there. For that matter, 3-D printers, combined with a camera and CAD software can let a criminal make a copy of your key from nothing more than a photograph.
Today, passwords are just as easily stolen. There are a number of different attack vectors criminals use to steal passwords, but there are four that stand out as most common:
- Less secure sites have their accounts stolen, and passwords are reused elsewhere
- Phishing emails convince unsuspecting users to type their credentials into clone websites
- Criminals with physical access to a workspace find passwords written down
- Criminals use publicly available information about users to reset their passwords through forgotten password forms
A strong password is still a good initial deterrent against opportunistic attacks, but for those truly determined to get in, they're simply not enough.
MFA - The Security Guard at the Door
According to Microsoft's identity security research, over 99% of automated account-compromise attempts are blocked when MFA is enabled. MFA acts as a guard at the door, asking the person using the key to confirm their identity in another way before allowing access. While it is still possible to fool the guard, the most common, scalable, and inexpensive attacks - the kind that rely heavily on stolen credentials, are readily stopped before they can take root. The key here is that MFA forces an attacker to move out of automation to a more focused, manual attack, and the accounts of every-day users are typically not worth that level of effort from mainstream threat actors.
Choosing the Right MFA Solution
Let's be honest here, though. MFA is not the end-all, be-all answer to security we wish it could be. There are limitations, and not all solutions are created equal, either. Some methods are stronger than others. For example, using a one-time code supplied via SMS/Text is better than just a password, but for a targeted attack, SMS can be intercepted. App-based prompts - such as Microsoft Authenticator or Okta - are significantly more secure while hardware keys are nearly impossible to bypass without significantly more effort. All that said, if SMS is the only option available, it is significantly stronger than just a password. It is better to have a baseline MFA option than no MFA at all.
So how do you choose the right MFA solution? There are several key factors to consider:
- Cost
- Ease of Implementation
- Ease of Use
- Reliability
There are more solutions providers and types of MFA solutions out there than we can reasonably cover in this article, but the four bullets above apply for all of them. Again, any solution here is better than no MFA at all. Talk with your technology partner to see what options are available that fit your needs. Ultimately, an effective solution is one where user adoption is high and individuals are easily trained on the use of the tools.
For Business, MFA is No Longer Optional
Let's face it, MFA is something everyone should be implementing both at home and at work. There is no reason why, in 2026, anyone should be ignoring the need for MFA. That said, for businesses , the case for MFA is no longer optional or theoretical. In fact, many cyber-insurance policies today require that businesses use MFA or they will not honor the terms of the policy in the event of a breach. If your company deals with government agencies or contractors who do business with government agencies, maintaining your contract depends on the successful implementation of MFA.
How Utah Tech Repair Can Help
With so many options and methods available, the selection of an MFA solution can be an overwhelming process. The good news is that you don't have to navigate the journey alone. Utah Tech Repair is here to help you evaluate options that work within your budget and current technology stack to ensure that you remain compliant and, more importantly, safeguarded from online threats.
Give us a call at 801-979-6477, or reach out via email at support@utahtechrepair.com to see how we can help secure your online presence.