Do These Digital Things to Stop Ransomware With Multi-Factor Authentication (MFA)
I’ve been at this a while — three decades, actually. Long enough to recall a time when firewalls were optional and a strong password truly meant something. These days? It’s as good as a wet and soggy piece of paper lock. And here’s why—ransomware preys on weak logins. It’s the easiest way in. Fancy zero-day or elaborate social engineering? Nah, I’m going to catch somebody using Password123. However, there is an easy, transformative way to slam that door shut: Multi-Factor Authentication (MFA).
I’ve seen it work firsthand. When PJ Networks recently worked with three banks to completely upgrade their authentication systems as part of a zero-trust architecture upgrade. They had a white board, they went from password only logins (which come on, essentially asking to be breached) to full MFA on every possible aspect. The improvement? Night and day.
How Hackers Take Advantage of Weak Logins
Ransomware attacks almost always begin the same way — with stolen credentials. Often, it’s not even your fault:
- Credential stuffing: Attackers use leaked passwords from data breaches and test them on different accounts. So if you’re reusing passwords (and millions do), they will get in.
- Phishing: You click on the wrong link, type your credentials into a fraudulent login page and bam, your access is theirs.
- Brute force & password spraying: If your password is weak, attackers guessed their way in before lunch.
- Malware & keyloggers: If they have access to your system already, they can log every keystroke you write.
Let’s face it — passwords are a joke by itself. And if you believe yours is strong because you included a capital letter and a number? Think again.
Business Analysis: Nearly a Ransomware Breach
A client of PJ Networks — a midsized firm — had an employee whose VPN credentials were compromised. The attackers logged in, disabled security tools from the inside, and were one step away from deploying ransomware when we caught them. The reason this happened? No MFA.
The MFA rollout that came next was … let’s say mandatory.
Why MFA is Essential
Let’s cut to the chase. MFA prevents unauthorized access. Period. Even if your password is broken, intruders still have to contend with another authentication factor — a text code, an app approval, a hardware key — to gain access. Think of it like a deadbolt. A password, by itself, is a typical door lock (and a flimsy one at that). MFA provides a second, much stronger roadblock.
Here’s what you need to know:
- 99% of account takeover attacks would have been stopped by MFA (That’s not me just making stuff up — that’s an actual study from Microsoft.)
- Without MFA, VPNs and remote desktop access is low-hanging fruit. Attackers constantly scan the internet for systems that they can exploit. If there’s no MFA? They’re in.
- MFA does not need to be inconvenient. There are non-intrusive ways to roll it out (biometrics, push notifications, hardware keys).
And listen—I know what some of you are saying: MFA annoys us. You know what’s worse? Now you’re paying ransomware attackers half a million dollars because they encrypted your entire business.
How to Deploy MFA: 12 Best Practices
Deploying MFA isn’t a one and done process. I’ve watched companies adopt it poorly — which turns users against it, or worse, hackers bypass it. Here’s how to do it right:
- Employ At Minimum Two Strong Factors
Not every MFA option is equally effective. Some are (hi, SMS-based MFA…) that can be bypassed. So here’s the order of strength:- Best: Hardware tokens (YubiKey, smart cards)
- Good: Application speaking, e.g Google Authenticator, Microsoft Authenticator
- Fine-but-high-risk: SMS codes (better than nothing but susceptible to SIM swapping)
- Put MFA in the way of Everything That Matters
- VPNs & remote access (This is non-negotiable.)
- Email & admin accounts (If someone takes over your email, they can reset everything else.)
- Financial & HR systems (Payroll fraud is a different underrated nightmare.)
- Low Friction with Conditional Access
Instead of prompting MFA every time (which users will hate) you use conditional policies:- Only trigger MFA when logging in from an unrecognized device
- Enable no-password logins via biometrics on trusted phones.
- Block access entirely from countries you don’t operate in.
Today’s MFA solutions allow you to tailor to your security and usability needs. Nobody wants to hit approve on an MFA prompt 50 times a day.
- Educate Users on Avoiding MFA Fatigue
Here’s a genuine attack vector: Hackers barrage a user with MFA requests until the user accidentally approves one out of frustration. Tell your employees what to look for:- Getting MFA prompts that you didn’t request? Someone has your password.
- Don’t approve a login unless it’s you who’re actually logging in.
- Immediately report any suspicious MFA requests.
MFA by itself is not a silver bullet — but when used with good policy and user training — it’s a nightmare for attackers.
PJ Networks’ Multifactor Authentication (MFA) Security Services
We’ve deployed robust MFA across enterprise environments — banks, manufacturing firms, you name it, government sector.
Here’s how it looks when PJ Networks configures MFA:
- Implement MFA solution that works for your business (hardware keys, app-based authentication, biometrics).
- Put it on your existing security stack.
- Compliance with security frameworks (NIST, ISO, RBI policies for banking, etc.)
- Train employees so they’re not the weak link
We’ve thwarted various ransomware attempts from successfully happening — because hackers couldn’t log in, simply put, thanks to MFA.
Conclusion
Ransomware attacks are not letting up. I hear about another business falling victim every single week — and many times it’s because someone got in with stolen credentials. Passwords alone are insecure. We know this. We’ve always known this. Yet, businesses still heavily depend on them.
MFA is the best, easiest protection against credential-based attacks. It isn’t very expensive and doesn’t need complicated infrastructure, and — when done correctly — it stops attackers from establishing that early foothold. If your business isn’t using MFA yet on critical accounts? Now’s the time. Unless you let ransomware make that decision for you.
