The Security Landscape Has Changed – MFA Is No Longer Enough

The Security Landscape Has Changed - MFA Is No Longer Enough

With cybercriminals targeting legal, accounting, and consultancy businesses for their valuable client data, Multi-Factor Authentication (MFA) has become a non-negotiable defence for professional services. But while MFA is a cornerstone of a sensible cyber security strategy, the uncomfortable truth is that it’s no longer sufficient on its own.

For Surrey’s businesses, protecting sensitive data effectively means understanding the strengths and weaknesses of MFA. Today, we’re exploring both.

MFA for Professional Services: What It Is & Why It Matters

Think about how many applications are linked to each user account in your business. Every one of them is a potential entry point. If a cybercriminal gained access to one person’s credentials, they could exploit every piece of data that user is privy to – which likely includes information the user doesn’t even realise they can access – without detection.

MFA attempts to stop this.

How MFA Works

At its core, MFA requires users to verify their identity through multiple verification methods before granting access to systems or data. This typically includes:

  1. Something you know (password)
  2. Something you have (mobile device, security key)
  3. Something you are (biometrics like fingerprints)

You’re already familiar with MFA protocols. In fact, you probably use at least one every day. Common implementations include:

  • SMS verification codes
  • Hardware security keys
  • Facial recognition (like FaceID)
  • Fingerprint recognition (like TouchID)

By requiring multiple verification factors, MFA creates significant barriers for unauthorised access attempts. Or, at least, that’s what it was designed to do.

This multi-layered approach is particularly valuable for protecting professional services firms where client confidentiality is paramount. But in 2025, is it really still effective?

MFA Myth-Busting

“MFA Is Disruptive”

In a world where we’re so used to streamlined processes, many feel that adding MFA creates unwelcome friction. Taking time to verify your identity slows down workflows, which (understandably) frustrates employees who just want to get on with their jobs.

The Reality: While MFA does add an extra step to the authentication process, it’s important to remember that the minor inconvenience of verification is insignificant compared to the catastrophic disruption of a security breach.

For professional services firms, those few seconds pale in comparison to the weeks of remediation, reputation damage, and potential regulatory penalties following a successful attack. By increasing your team’s awareness of this, you can turn contempt for MFA into consistent usage.

Local IT support in Surrey can also help you implement MFA solutions that balance security with usability. They’ll ensure work can continue uninterrupted while maximising protection.

“MFA Is A One-And-Done Solution”

Once MFA is implemented, that’s it – your security concerns are resolved!

The Reality: If only it were that easy. MFA is just one component of a comprehensive security strategy. While it significantly strengthens access security, it has to be complemented by other measures such as endpoint protection, regular security training, and advanced threat detection.

Like any business, protecting professional services requires a holistic, multi-layered security strategy that addresses both technological and human factors.

“MFA Is Immune to Exploitation”

There’s also a fairly prevalent idea among businesses that MFA provides absolute protection against unauthorised access. Whether this is down to misinformation or simply a lack of it is irrelevant – what’s more important is that it’s just not true.

The Reality: Techniques like real-time phishing, MFA bombing, and social engineering can circumvent traditional MFA implementations. As this Infosecurity Magazine article highlights, the tokens used in MFA can even be intercepted by cybercriminals to lock users out of their accounts.

So if you’re looking to use MFA for professional services, how do you combat these dangers?

Mitigating MFA Vulnerabilities (& Tackling MFA Fatigue)

If you’ve ever tried to log in to a Gmail account on a new device, you’ll likely have received an email or SMS asking you to verify the login attempt. These push requests typically give details on the location and device the login is being attempted from.

Cybercriminals can take advantage of this feature through what’s known as ‘push spam’ or ‘push bombing’ – essentially causing push requests to be sent over and over again, potentially for hours. The hope is that you’ll either accidentally approve one out of frustration, or believe your account is truly compromised and enter your credentials on a fake verification page.

Advanced MFA Protection Strategies

Tempting as it may be, simply turning off push notifications isn’t the answer. Legitimate authentication requests still need to be processed. Instead, work with an IT support provider in Surrey to implement these enhanced security measures:

  1. Number Matching

Modern MFA systems support number matching. This requires users to enter a number displayed on their login screen into their authenticator app or vice versa, and significantly reduces the effectiveness of blind approval attacks.

  1. Request Limiting

It’s possible to limit the number of MFA requests per account, after which point the account is automatically locked and requires administrator intervention. This prevents attackers from bombarding users with endless authentication requests, creating an effective circuit breaker that stops persistent attack attempts.

  1. Conditional Access

Microsoft 365 Business Premium offers powerful conditional access capabilities that go beyond basic MFA. These policies allow you to:

  • Restrict access to company resources to company-managed devices only
  • Block sign-ins from unusual or high-risk locations
  • Require stronger authentication for sensitive applications
  • Automatically block sign-in attempts that show suspicious patterns

Conditional access provides contextual security that adapts to different risk scenarios. You benefit from strengthened defences that are more intelligent than standard MFA, without unnecessary added friction.

  1. Microsoft Authenticator App

While various MFA methods exist, the Microsoft Authenticator app offers enhanced security features specifically designed to counter modern threats. Aside from number matching, it also provides:

  • Location-based approval context
  • Phishing-resistant FIDO2 security key functionality
  • Offline authentication capabilities

If you’re looking to implement MFA for professional services, be sure to prioritise authenticator apps over less secure methods like SMS verification.

  1. Geofencing for Enhanced Protection

Geofencing creates virtual boundaries that restrict access based on geographic location. For businesses with primarily local operations, this approach can:

  • Block sign-in attempts from high-risk countries
  • Limit access to office locations and employee homes
  • Require additional verification when accessing resources from unusual locations

For Surrey-based businesses, geofencing with the help of local IT support creates an extra security layer that significantly reduces your attack surface.

Building Brilliant, Resilient Security in Your Business

While MFA remains a critical security component for professional service firms, it must be implemented as part of a comprehensive security strategy that addresses both current and emerging threats.

As security frameworks evolve, forward-thinking businesses are enhancing traditional MFA with contextual authentication approaches. By working with specialist support to implement more advanced configurations and conditional access policies, you can significantly enhance your security posture – without compromising productivity.

Intalex: Protecting Professional Services With Strategic IT Support in Surrey

At Intalex, we understand the weight of responsibility that comes with protecting your business data.

We’re dedicated to creating lasting partnerships that drive measurable results through intelligent, tailored technology solutions shaped around you. From managed IT support to smarter cyber security and AI consulting, we can help you gain clarity and confidence in your everyday systems.

If you’d like to find out more about creating a comprehensive security strategy for your business, why not get in touch? Book a meeting with James today.