The risks of not having Multi-Factor Authentication
Blog|by Leanne Bevan|28 September 2022
October marks Cyber Security Awareness Month, There are four focus areas this year: multi-factor authentication, strong passwords, software updates, and protection against phishing.
This is the first in a series of blogs where we will look at each of the focus areas in more detail. Specifically, we'll focus on the implications of not having such things in place.
First up is multi-factor authentication.
What is multi-factor authentication?
Multi-factor authentication (MFA) is a form of authentication that requires a user to provide two or more verification factors to gain access to a resource, such as an application, VPN, or online account. One factor is typically something you have, such as a mobile (where often a code is sent), and another is something you are, like a fingerprint to verify your identity. The last factor is a username or password.
What are the risks of not having multi-factor authentication in place?
Here are just some of the risks you’ll encounter if you do not have MFA in place:
Ease of hacking
Firstly, if you just access a workspace via a single password, regardless of how complex the password is, hackers have tools in place to hack and find out what that password is accessing all your data. And not only that, but they can also use your private information to their benefit to get access to other data and money, by pretending to be you. Scary right?
If hacked, cybercriminals could hold your data and apps for ransom. This could then be very costly, time-consuming and stressful to sort out.
IT peace of mind
For the IT team, using MFA and personal identification ensures they know it is definitely the right person accessing your company’s workspaces, data and applications. Providing peace of mind.
Compliance
It’s also worth noting that multi-factor authentication is also a requirement for both Cyber Essentials and Cyber Insurance (there will be blogs on each of these in the coming weeks). Plus, compliance with various other data regulations. If you don’t have MFA in place, you’re not compliant.
Company reputation
Your company’s reputation can be at stake too if hacked. If customers see that you don’t take the necessary precautions, they may lose trust in your organisation and the safety of their information, and therefore move elsewhere. Losing your customer loyalty and income.
How we can help you with MFA
We offer a number of multi-factor authentication solutions and have a dedicated cyber security expert who can discuss which option is best for budget and technical requirements. They can also explore the other ways you can protect your business’ data from all angles.
Fill in the form below to find out more and book a consultation with our cyber security expert.
Our next blog will focus on the importance of using strong passwords and password management tools.
Updated March 2025
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Author
Leanne Bevan
Vendor Marketing Manager at Grey Matter
Leanne has been part of our team for over a decade, and has worked as a vendor marketing manager for a number of our key vendors. Now with a keen focus on cyber security as well as developer technologies, Leanne continues to manage marketing across several vendors, including Embarcadero, Acronis, ESET, and more.
Related News
Native performance – why it still wins in a cross-platform world
Cross-platform development has never been stronger. Modern frameworks let teams ship applications across Windows, macOS, iOS and Android from a shared codebase – faster, leaner and with fewer moving parts. But when performance is part of the product, portability alone isn’t enough. If...
Location Intelligence as application infrastructure
Location intelligence is no longer a feature bolted onto asset‑centric platforms. In 2026, it’s core application infrastructure. As asset tracking moves beyond logistics into regulated, distributed and high‑value environments, software teams need location intelligence that delivers real‑world context, not just coordinates. This shift is redefining how modern applications manage risk, automation and scale.
Is your business ready? The 2026 Cyber Essentials Danzell update explained
Cyber Essentials is changing – and this time, it’s not just a paperwork exercise. From 27 April 2026, a new version of the scheme comes into force. The UK Government and IASME are introducing the “Danzell” update (v3.3), designed to tighten up how you’re assessed and, crucially, how compliance...
ESET special offer: three years for the price of two
ESET has announced a new special offer for Spring 2026. From 1 April to 31 May 2026, when you purchase new licences or upgrade to the higher-tier products, you’ll receive three years of protection for the price of two. ESET...