Cybersecurity6 min read

MFA Is Not Optional Anymore. Here's How to Actually Get Your Team to Use It.

By Inevat Team·September 3, 2025
MFA Is Not Optional Anymore. Here's How to Actually Get Your Team to Use It.

Of all the security improvements we implement at client sites, MFA generates the most pushback. More than any other change. More than new software. More than password policies. For some reason, asking someone to tap their phone when they log in triggers an existential crisis about personal freedom and productivity.

We get it. Change is annoying. Extra steps are annoying. But we also know this: Microsoft's own data shows MFA blocks 99.9% of automated account compromise attacks. That's not a rounding error. That's the difference between "we got phished and nothing happened" and "we got phished and now we're negotiating with ransomware operators."

So here's our honest playbook for rolling out MFA without burning the building down.

First: Understand Why People Resist It

Before you can solve the problem, you have to understand it. Employee resistance to MFA usually falls into a few buckets:

  • "It slows me down." Valid. But we're talking about 10 extra seconds per login, not 10 minutes.
  • "What if I lose my phone?" Also valid. Account recovery is a real thing that needs a real answer.
  • "Why do we need this all of a sudden?" This one is really about communication and trust.
  • "I don't understand how it works and that makes me anxious." This one nobody will say out loud, but it's very common.

Each of these has a specific response. "It slows me down" is answered with numbers. "What if I lose my phone" is answered with a documented recovery process. "Why now" is answered with a real explanation. "I don't understand" is answered with good onboarding.

Step 1: Pick the Right Authenticator App

Don't use SMS text message codes as your MFA method. They're better than nothing, but SIM swapping attacks and SS7 vulnerabilities make SMS-based MFA the weakest option. Use an authenticator app instead.

Our recommendation for most businesses: Microsoft Authenticator if you're on Microsoft 365 (it integrates seamlessly), or Google Authenticator as a general-purpose alternative. For higher security environments, hardware keys like YubiKey are excellent but create more administrative overhead.

Step 2: Communicate Before You Enforce

The worst way to roll out MFA is to flip the switch and then explain yourself after the fact. Give your team at least a week's notice. Explain why. Be honest:

"We're turning on MFA for all accounts starting [date]. This means you'll need to approve logins from the Microsoft Authenticator app on your phone. Setup takes about five minutes and we'll help anyone who needs it. We're doing this because account takeover is the #1 cause of business data breaches, and this is the single most effective thing we can do to prevent it."

That's it. No jargon. No fear-mongering. Just: here's what's changing, here's when, here's why, here's how we'll help you.

Step 3: Set Up a Hands-On Enrollment Session

Schedule 30 minutes — in person or via video call — where employees can get help setting up the authenticator app. You'll be surprised how many people need this. "I couldn't figure out the QR code" is a real conversation we have regularly. Give people a low-pressure way to ask for help before enforcement kicks in.

Step 4: Enforce It, But Do It Gracefully

Conditional access policies in Microsoft 365 and Entra ID let you enforce MFA without being brutal about it. You can:

  • Require MFA for logins outside your office network first, then expand to all logins
  • Set "trusted devices" so employees don't get prompted every single time on their work computer
  • Use number matching (the app shows a number you have to match) to stop MFA fatigue attacks
  • Configure sign-in frequency so sessions don't expire every two hours

The goal is to make MFA invisible when it doesn't need to be visible, and present when it does.

Step 5: Have a Recovery Plan That People Know About

The single biggest anxiety is: "what happens when I lose my phone?" Answer this question before anyone asks it. Your IT team (or us) should have a documented process for account recovery that doesn't require the user to panic. At minimum:

  • Every user should have backup codes saved somewhere safe
  • Admins should have a clear process for resetting MFA on accounts
  • Users should know who to call and what to expect

The Numbers That Should Convince Even Your Most Resistant Employee

Attack Type Success Rate Without MFA Success Rate With MFA
Credential stuffing (automated) High Near zero
Password spray Moderate Near zero
Phished password 100% ~1% (real-time phishing only)
Brute force High (weak passwords) Near zero

The average business email account compromise costs $137,000 according to the FBI's 2024 IC3 report. The Microsoft Authenticator app is free. There's your ROI calculation.

What About the "I Don't Have a Smartphone" Person?

It comes up. For employees without smartphones, you have a few options: hardware authentication keys (YubiKey is around $50), a dedicated authenticator tablet that stays at the desk, or in some cases a backup email or phone number as a fallback. None of these are perfect, but they're workable — and they're much better than leaving that account as an unauthenticated door into your environment.

MFA isn't a nice-to-have anymore. It's what your cyber insurance requires, what your compliance frameworks require, and what common sense requires. The good news is that when it's rolled out well, most employees don't even notice it after the first week.


Need help with this? We can assist.

Inevat provides managed IT and cybersecurity for businesses nationwide. Schedule a free consultation to talk through your situation.

Schedule a Free Consultation

Related Articles

Cybersecurity

Ransomware Isn't Just for Big Companies Anymore (And What the First 72 Hours Actually Look Like)

There's a persistent myth that ransomware gangs only go after big targets. The reality is the opposite — small and mid-sized businesses are the primary target, precisely because they're less defended. Here's what happens when ransomware hits, from the first encrypted file to the insurance call.

Read Article: Ransomware Isn't Just for Big Companies Anymore (And What the First 72 Hours Actually Look Like)
Cybersecurity

Phishing Has Gotten Smarter. Your Email Filter Hasn't.

The phishing emails hitting Utah businesses in 2025 look nothing like the Nigerian prince emails from 2010. They're personalized, convincing, and increasingly written with AI assistance. Here's what's changed — and what actually stops them.

Read Article: Phishing Has Gotten Smarter. Your Email Filter Hasn't.
Cybersecurity

What the Dark Web Actually Is (And Why Your Business Data Is Probably On It)

The dark web sounds like something out of a thriller. It's not as dramatic as Hollywood makes it, but it's a lot more relevant to your business than you'd think. Here's a plain-English breakdown — and what you should actually do about it.

Read Article: What the Dark Web Actually Is (And Why Your Business Data Is Probably On It)