• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
You need more than a good password to be secure

More Than a Password Campaign

July 28, 2022 Posted by Julia Muccini IT Security

Gone are the days when just a password could protect your organization’s account. In today’s world, passwords are much easier to crack, especially when the most popular password in the U.S. continues to be “123456”. Even complex passwords are not enough to thwart hackers desperately trying to access your accounts. The number of external attacks increases every year.

Microsoft’s recently released cybersecurity report Cyber Signals stated that they blocked more than 25.6 billion attempts to break into accounts of enterprise customers in 2021. Unfortunately, they also stated that just 22% of Azure Active Directory customers have enabled MFA on their accounts. Microsoft Corporate Vice President of Security, Compliance and Identity called these daunting statistics “a dangerous mismatch because the attacks are increasing, but the preparation is not there yet”. We need an extra layer of defense to protect our information: multi-factor authentication (MFA). MFA (also known as 2FA or two-factor authentication) is of the most important security controls your organization can implement. It adds a second layer of protection in securing your online accounts.

The Cyber & Infrastructure Security Agency (CISA) recently started a campaign called “More Than a Password” urging private sector organizations to help raise public awareness about using MFA. Especially critical now as CISA issued a “Shields up” warning in February about Russian cyberattacks due to the war in Ukraine, MFA is vital in protecting your business. Think of MFA as an invisible bubble that can protect your organization’s data. According to Microsoft, users who enable MFA are 99% less likely to get hacked. This is because MFA uses two forms of authentication (instead of just one) so even if one form is compromised, unauthorized users will still be unable to meet the second authentication requirement ultimately stopping them from gaining access to your accounts. There are three main methods of authentication that can be used for MFA (at least two are selected depending on the service/application):

  • Something you know – Certain information known only to the user such as a password or a pin.
  • Something you have – An object the user has in their possession that can be physical or virtual. Physical objects could include security tokens, keys or smart cards. More common are virtual objects such as authentication apps (i.e., Microsoft Authenticator, Okta, Duo, etc.), email or SMS messages that include a one-time pin.
  • Something you are – This includes biometric authentication such as a fingerprint scanner, voice or facial recognition.

Most websites and applications offer MFA free of charge to encourage better cybersecurity hygiene. In some cases, your organization may have to turn on the MFA requirement in the application settings, but setup is generally very quick and inexpensive (depending on where and how MFA is being implemented). CISA recommends not only implementing MFA for your work life, but also for your personal life. MFA can be enabled on your social media accounts, your bank accounts, email accounts, etc. It is especially important when accessing sensitive information such as bank information, Social Security numbers, health care information, etc. Passwords won’t save you anymore, but multifactor authentication will.

Learn more about the benefits of multifactor authentication along with other IT Security Best Practices by contacting OCD Tech.

Share
0

About Julia Muccini

Joining the team in 2021, Julia is an IT Compliance Analyst. Before joining the firm, Julia received a Bachelor’s Degree in Criminal Justice from Saint Anselm College in Manchester, NH, and her Masters Degree in Cybersecurity: Policy & Governance from Boston College. She implements processes and technical solutions to identify, monitor, and resolve information security and compliance risks.

You also might be interested in

DATA MANAGING AND ANALYSIS

Data Management and Analysis

Jul 18, 2023

National Dapper Your Data Day: Tips for Data Management and[...]

Top 10 Mac OSX Security Tips

Jul 10, 2017

The Apple Mac OSX platform is not immune to virus[...]

Cybersecurity Maturity Model Certification (CMMC)

Apr 28, 2020

Does your organizaton currently hold DoD contracts including the DFARS 252.204-7012 clause?

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next