Your Passwords Are Already for Sale. Here's the One Thing That Stops It from Mattering.
Here's something most business owners don't want to hear. Your company's passwords are probably already floating around the dark web. Not might be. Probably are.
We run dark web scans for businesses across Southern Colorado, and it's rare that we come back with a clean report. Old LinkedIn breach, Adobe hack from years ago, some random service an employee signed up for in 2019. The passwords leak, they get bundled into lists, and they get sold. It happens to everyone.
But here's the part that matters: whether that's a crisis or just a footnote depends entirely on one thing. Whether you have MFA turned on.
What happens without MFA
Say one of your employees used their work email and a common password to sign up for some app three years ago. That service gets breached. Now their email and password are sitting in a database that anyone can buy for about $20.
An attacker grabs it, tries it on your Microsoft 365 login. And it works. Because people reuse passwords. Almost everyone does.
Now they're in your email. They can read client conversations, download attachments, send emails as your employee. If they're patient (and they usually are), they sit quietly for weeks. They learn how your business works. Then they hit you with a fraudulent wire transfer, a fake invoice, or they deploy ransomware.
We've seen this exact scenario play out with businesses right here in Pueblo and Colorado Springs. It's not theoretical.
What happens with MFA
Same scenario. Attacker buys the stolen password, tries it on your Microsoft 365 login. The password works. But then the system asks for a second verification. A code on the employee's phone, a push notification, a fingerprint.
The attacker doesn't have that. They're done. They move on to the next business on their list that didn't bother to set it up.
The excuses we hear (and why they don't hold up)
"My employees will hate it." They'll grumble for about a day. Then it becomes muscle memory, like locking your car. We've rolled this out for dozens of businesses and the complaints disappear within a week. Every time.
"We're too small to be a target." Actually, you're the perfect target. 43% of cyberattacks hit businesses with fewer than 100 employees. Attackers go after small companies specifically because the defenses are usually weaker.
"It's complicated to set up." It's really not. For Microsoft 365, it takes about 15 minutes per user. Most of that is just walking people through installing the Authenticator app on their phone. We handle the policy configuration on the backend.
"We don't have anything worth stealing." You have client data, bank accounts, email access, and a reputation. That's plenty.
What MFA actually looks like day to day
Your employee opens their laptop in the morning, signs into Microsoft 365. Their phone buzzes with a notification that says "Approve sign-in?" They tap approve. That's it. Takes about two seconds.
If they're already signed in on a trusted device, they might not even get prompted again for days. It's not the constant annoyance people imagine.
And here's the thing nobody talks about. It actually makes your team feel safer. Once people understand that even if their password gets stolen, their account is still protected, there's less anxiety about clicking the wrong link or getting phished. It's a safety net, and people appreciate safety nets.
Where to start (the three accounts that matter most)
If you do nothing else after reading this, turn on MFA for these three things:
Email (Microsoft 365 or Google Workspace). This is the master key. If someone gets into your email, they can reset passwords for everything else. Protect this first.
Your bank and financial accounts. Most banks offer MFA now. Turn it on. Use the app-based option, not SMS if you can help it (SIM swapping is a real thing).
Any remote access tools. VPN, remote desktop, cloud file storage. Anything that lets someone access your business from outside your office needs a second factor.
After those three, work through everything else. But those three cover about 90% of the risk.
The cost of not doing it
A single compromised email account can cost a small business anywhere from $25,000 to $200,000. That's not the ransomware number. That's just business email compromise, which is the most common attack we see. Fake invoices, redirected payments, stolen client data.
MFA costs nothing. It's included in every Microsoft 365 plan. Google Workspace too. The authenticator apps are free. The only cost is the 15 minutes it takes to set it up per person.
We genuinely can't think of another security measure that has this kind of return on investment. It's the closest thing to a free lunch that exists in cybersecurity.
If you're not sure whether MFA is turned on across your business, or you know it's not and you need help rolling it out, we're happy to take a look. The assessment is free, takes about 30 minutes, and we'll tell you exactly where you stand. No pitch, no pressure.
Free Consultation
Questions About Your IT?
Book a free assessment with Efrain. No sales pitch, no obligation.
Get Your Free Assessment