How to Set Up Multi-Factor Authentication (MFA) to Protect Your Accounts
Passwords alone are no longer enough to protect your business.
With phishing, credential theft, and AI-driven attacks on the rise, it’s easier than ever for cybercriminals to get hold of login details, and harder than ever to spot when they do.
That’s why every organisation, no matter the size, should be using Multi-Factor Authentication (MFA).
MFA adds an extra layer of security that can stop more than 99% of account compromise attempts, according to Microsoft. It’s quick to set up, free to use, and one of the most effective defences against cyberattacks.
What Is Multi-Factor Authentication?
Multi-Factor Authentication (MFA) is a simple security process that requires users to prove their identity in two or more ways when logging in.
Typically, that means:
Something you know — your password.
Something you have — your phone or security token.
(Sometimes) Something you are — like a fingerprint or facial recognition.
Even if a hacker steals your password, they can’t log in without that second piece of proof.
Think of it as locking your door, and then adding a deadbolt.
Why MFA Matters More Than Ever
Most cyberattacks start with compromised credentials.
Hackers use phishing emails, password reuse, or brute-force attacks to get into accounts, often without triggering alarms.
Once inside, they can move laterally, access data, and even use your accounts to launch attacks on others.
MFA prevents this.
It blocks unauthorised logins, even if your password has already been exposed online.
And with password databases and dark web leaks becoming increasingly common, this extra step is no longer optional, it’s essential.
How to Set Up MFA (For Any Account)
Every major online platform now supports MFA, whether it’s Microsoft 365, Google, LinkedIn, Xero, or your banking app.
Here’s how to get started:
Step 1: Find Your Account’s Security Settings
Go to the account’s Settings or Security section.
Look for “Two-Step Verification,” “2FA,” or “Multi-Factor Authentication.”
Step 2: Choose Your Authentication Method
Most platforms offer a few options:
Authenticator app (recommended): Apps like Microsoft Authenticator, Google Authenticator, or Authygenerate time-based one-time codes or push notifications.
Text message (SMS): The service sends a code to your phone. (Useful, but less secure than app-based methods.)
Hardware token: A physical device that plugs into your computer or uses NFC to confirm your identity.
Choose the method that best suits your workflow — authenticator apps are the best balance of security and convenience.
Step 3: Scan the QR Code or Enter a Key
When enabling MFA, most platforms will show a QR code.
Open your chosen authenticator app and scan it.
This links the app to your account.
You’ll then see a short numeric code in your app — enter it on-screen to confirm setup.
Step 4: Save Your Recovery Options
If you lose your phone or change devices, you’ll need a way to regain access.
Most platforms offer backup codes — save these securely in a password manager or encrypted file.
Step 5: Test It
Log out and back in.
You should now be prompted for your second factor — a code or a push notification.
Once you’ve confirmed it works, you’re protected.
Tips for Managing MFA Across Your Business
Rolling out MFA company-wide takes planning, especially if you have multiple tools and systems.
Start with critical accounts — like email, finance, and cloud storage.
Communicate clearly — explain why MFA matters and how to use it.
Use a consistent app — standardise on one authenticator (e.g. Microsoft Authenticator) to simplify support.
Monitor and manage centrally — your IT team or MSP can track compliance and help reset MFA if users lose access.
Review regularly — ensure all new accounts and services have MFA enabled from day one.
When MFA Isn’t Enough
While MFA is a massive step forward, it’s not a silver bullet.
Attackers can still use advanced phishing tactics or MFA fatigue attacks (where users are bombarded with fake prompts until they accept one).
To stay ahead, combine MFA with:
Password managers to generate unique, strong credentials.
Email protection to block phishing attempts before they reach staff.
Security awareness training to teach users what real MFA requests look like.
How Sunrise Technologies Can Help
At Sunrise Technologies, we help businesses secure their systems through proactive cybersecurity.
We implement, manage, and monitor MFA across platforms, from Microsoft 365 to cloud apps and remote devices — ensuring your team stays protected wherever they work.
Our cybersecurity services also include:
Endpoint and cloud monitoring (SOC)
User awareness training
Compliance support for Cyber Essentials and GDPR
Disaster recovery and incident response
Protecting your business starts with small steps that make a big difference, and enabling MFA is one of the most powerful.
Multi-Factor Authentication is one of the simplest, most effective defences against cybercrime.
It only takes a few minutes to set up, but it can stop 99% of attempted breaches.
If you’d like help rolling out MFA across your business or ensuring your systems are properly protected, get in touch with Sunrise Technologies for a free cybersecurity assessment.