Back to Blog

The Importance of MFA: Elevating Cybersecurity in the San Francisco Bay Area

August 20, 2025

What Is MFA and Why Should You Care?

Let me start with a simple analogy. Your front door has a lock. But you probably also have a deadbolt. Maybe a security camera. Maybe a dog that barks when someone approaches. Each of those is an additional factor that makes your home harder to break into. Multi-Factor Authentication — MFA — works the same way for your online accounts.

I am Bruce Johnson, a cybersecurity speaker and consultant based in the San Francisco Bay Area. I have worked with companies like Dell, CyberArk, and Delinea, and I founded Axis Labs to help organizations build practical security programs. One of the most impactful changes any organization can make is turning on MFA. It is simple, it is effective, and it stops the vast majority of account-based attacks in their tracks.

Why Passwords Alone Are Not Enough

Here is the reality: passwords get stolen. They get leaked in data breaches. People reuse them across multiple sites. Employees write them on sticky notes. No matter how good your password policy is, passwords are a single point of failure.

According to industry research, over 80 percent of data breaches involving hacking use stolen or weak credentials. That means the attacker did not find a clever vulnerability in your software — they just logged in with someone's password.

MFA adds a second layer of verification. Even if an attacker gets your password, they cannot access your account without also having your second factor. It is like having a key to the front door but not knowing the alarm code. The key alone is not enough.

The Three Types of MFA You Should Know About

MFA works by requiring two or more of the following categories: something you know, something you have, or something you are.

Something you know is your password or PIN. Something you have is a physical device — your phone, a hardware key, or a smart card. Something you are is a biometric — your fingerprint, face, or voice.

In practice, most MFA implementations ask for your password plus a code sent to your phone or generated by an app. Let me break down the most common options.

SMS-Based MFA

This is the most basic form. After entering your password, you receive a text message with a six-digit code. You enter that code to complete the login.

It is better than no MFA at all, but it has weaknesses. Attackers can hijack your phone number through a technique called SIM swapping, where they convince your carrier to transfer your number to their device. Once they have your number, they get your codes.

For most everyday use, SMS-based MFA is fine. But for high-value accounts — banking, email, work systems — I recommend something stronger.

Authenticator Apps

Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-based codes on your device. These codes change every 30 seconds and are not tied to your phone number, which means SIM swapping will not help an attacker.

This is my recommended option for most people and most organizations. The apps are free, easy to set up, and work across almost every service that supports MFA. When I run security training sessions, I walk attendees through setting up an authenticator app on their phone in under five minutes.

Hardware Security Keys

For the highest level of security, hardware keys like YubiKey or Google Titan are the gold standard. These are small physical devices that plug into your computer or tap against your phone. You cannot be phished with a hardware key because the key verifies that you are on the legitimate website before it responds.

Major tech companies like Google have rolled out hardware keys to all of their employees and reported that phishing attacks against those employees dropped to zero. Zero. That is how effective these are.

For most organizations, hardware keys make sense for executives, IT administrators, and anyone with access to sensitive systems. For general employees, authenticator apps provide an excellent balance of security and convenience.

How to Roll Out MFA in Your Organization

If you are an HR manager, IT director, or event planner tasked with improving your organization's security posture, here is a practical roadmap for rolling out MFA.

Start with the high-risk accounts first. Email, VPN access, financial systems, and any admin-level accounts should have MFA enabled immediately. These are the accounts attackers target most aggressively.

Next, communicate clearly with your team. The biggest reason MFA rollouts fail is not technology — it is people. If employees do not understand why they are being asked to change their login process, they will resist. Send clear, jargon-free communications explaining what MFA is, why it matters, and exactly how to set it up. Better yet, hold a brief training session where people can set it up together and ask questions.

Provide support during the transition. Designate someone — whether it is IT staff or a designated champion on each team — to help people who get stuck. The first week is the hardest. After that, MFA becomes second nature.

Choose a reasonable grace period. Give people a deadline but make it reasonable — two to four weeks is typical. After the deadline, enforce MFA for all covered accounts. No exceptions.

Finally, plan for edge cases. What happens when someone loses their phone? Make sure you have a recovery process in place. Most MFA solutions offer backup codes that employees can store in a secure location. Hardware keys can be kept as backups. Having a clear process for these situations prevents panic and avoids locking people out of their accounts.

Why This Matters for Bay Area Organizations

The San Francisco Bay Area is one of the most targeted regions in the world for cyberattacks. The concentration of technology companies, financial institutions, healthcare providers, and startups makes this area a magnet for sophisticated threat actors.

Bay Area organizations also tend to have distributed workforces, with employees working remotely from home, coffee shops, and coworking spaces. Every one of those remote connections is a potential entry point for an attacker. MFA ensures that even if a password is compromised over an unsecured network, the account remains protected.

California's regulatory environment adds another layer of urgency. The California Consumer Privacy Act and other regulations require organizations to take reasonable steps to protect personal data. Implementing MFA is one of the clearest and most defensible steps you can take to demonstrate compliance.

The Return on Investment

MFA is one of the rare security measures that is both highly effective and relatively inexpensive. Most authenticator apps are free. Hardware keys cost between twenty and fifty dollars each. Compare that to the average cost of a data breach — which runs into the millions — and the math is overwhelming.

Beyond the financial argument, MFA protects your reputation. A breach that exposes customer data can destroy years of trust in a single headline. MFA dramatically reduces the likelihood of that happening.

The Bottom Line

Multi-Factor Authentication is not optional anymore. It is a fundamental security measure that every organization should have in place. The technology is mature, the tools are affordable, and the impact is immediate.

If you are looking to improve your organization's security posture and want help communicating the importance of MFA to your team, I offer training sessions and keynote talks throughout the Bay Area that make this material accessible and actionable. No jargon, no fear-mongering — just clear, practical guidance your team can implement right away.