Close this search box.

How multi-factor authentication blocks 99% of account hacks

Table of Contents

Microsoft has revealed that 300 million fraudulent attempts are made daily, to access its customers’ cloud services accounts – multi-factor authentication is the difference between your account remaining secure or being hacked.

Many of these fraudulent attempts are conducted by botnets – numerous devices linked together via the internet, that are used to perform a task.

In this case, these botnets run sophisticated password-cracking programs that attempt to breach your accounts.

Suffering an account breach can be damaging – particularly if you tend to use the same password for more than one account. A seemingly harmless account breach of a now-defunct social media account you used to use, could lead to criminals cracking your online banking details, or your email account.

Enter Multi-Factor Authentication

Multi-factor authentication (MFA) is the answer, according to a recent Microsoft study, which found that your account is 99% less likely to be compromised if you use MFA.

We also wrote earlier this year about how MFA is the key to securing your business – and this latest endorsement from Microsoft emphasises the importance of putting in place a layered approach to your cyber security.

What this means is that instead of simply using a password to access your account, you are required to enter two or more additional credentials. This means that if your password is breached, your account can still rely on further lines of defence.

So How Does Multi-Faction Authentication Work?

Multi-factor authentication is the layering of your account security by two or more methods. For maximum security, we recommend you use the three central principles of MFA – Knowledge, Possession, and Inherence.


For example, your password is the first factor. The stronger this password is, the better. We recommend using a password generator tool – this way, your password will be far more difficult to crack.

This is because passwords made by people tend to include information specific to that person.

This information could be ascertained through social engineering, including being asked subtly in conversation about family, pets, or sports teams – or even learned through your various online presences, including social media.

Unfortunately, passwords alone, regardless of their strength, are not enough to secure your accounts.


A code sent to your mobile or email address would be a second factor. The obvious advantage to using two factors is that even if your account password is compromised, a criminal still needs the authentication token that is generated automatically and sent to your mobile or email account.

Without access to both of these, your accounts cannot be breached. Botnets are typically able to brute force access to your account by ‘guessing’ thousands of passwords all at once, but without this second factor, the botnet cannot get gain access to your account.

However, if a criminal already has access to your email account, two factors may not suffice. This is why we recommend using the third factor – inherence.


Your third factor of multi-factor authentication might be either fingerprint or voice recognition.

Passwords can be guessed – and whilst it is quite unlikely – so can your second factor of authentication. Your fingerprint or voice, however, is far more difficult to replicate. Especially for automated bots.

With three layers of security in place; your password, your authentication token, and fingerprint or voice recognition – your business and personal accounts are immediately far more difficult to breach.

If you’re already using MFA – great, you’re following an industry best-practice. If not? You might want to consider talking to us about how you can enable MFA for your business.

To learn more about multi-factor authentication, contact us on 01283 753 333 or at

Want to keep up with our blog?

Get our most valuable tips right inside your inbox, once per month!

Latest IT News & Insights
Microsoft Dynamics 365 Business Central Main Product Mockup Showcase ERP
Why Business Central enhances and streamlines solutions
See how Microsoft Dynamics 365 Business Central enhances business solutions and streamlines the processes...
Read More
Neuways artificial intelligence
Artificial Intelligence: The Good, The Bad & The Ugly
AI is the Marmite of the IT world. Love it or hate it, the reality is it filters into our everyday lives...
Read More
Choose Neuways for your IT Support, Cyber Security and Business Central needs.
Cyber Security Acronyms Part 1: Neuways
We are helping clients to understand cyber security. We're making it easy for you, as we are jargon busting...
Read More
Password Manager and Security with neuways
Password Managers just became an even more important tool for Employees
The Government has brought in a ban on employees and manufacturers using default passwords.
Read More
Dark Web monitoring
What is the Dark Web?
Dark Web Monitoring identifies whether any of your company data (including login credentials and confidential...
Read More
Password Manager and Security with neuways
Password Security
Business Password Manager Tool Protect your remote workforce with Password Manager Tool, the business...
Read More
WatchGuard WiFi Security
WatchGuard User Services Platform – Simple, Secure and Intelligent WiFi
Why do Neuways partner with WatchGuard? Find out below to see how we improve the cyber security of your...
Read More
Endpoint Security
Endpoint Security
Protect your business with the best in Endpoint Security – How Neuways can help you Protect Your...
Read More

Frequently Asked Questions

Managed IT support is a comprehensive solution where an expert IT provider, like Neuways, handles your technology infrastructure. This includes proactive monitoring, maintenance, cyber security, and support.

Contact us

Support: 01283 753300

Business Development: 01283 753333

Purchasing: 01283 753322

Admin and Accounts: 01283 753311


Yes we do. Your business needs Cyber Security due to the increasing number of cyber threats that are affecting businesses in all industries. If your business has data and technology systems implemented, you will need Managed Cyber Security.

Yes we can. We have our own dedicated Microsoft Dynamics 365 Business Central teams who work to ensure that we can implement the right systems and solutions into your website that are absolute right for you. 

Got a question?

Reach out
& Connect

Please enable JavaScript in your browser to complete this form.