Multi-factor authentication blocks 99.9% of automated credential attacks. Microsoft, Google, Cisco Talos, and the FBI all converge on that number. Every cyber-insurance carrier asks about MFA coverage on every renewal. Every regulator that has issued security guidance in the past five years has explicitly called MFA a baseline expectation. And yet most North Central Florida small businesses are stuck at partial coverage — MFA on email, maybe, plus three or four other systems — because the rollout stalled on edge cases nobody could figure out how to address without disrupting daily work. This post is the 5-phase rollout we use with clients to get from "mostly enabled" to genuinely 100%.
99.9%
Automated credential attacks blocked by MFA
62%
Of SMBs report partial MFA coverage only
60 DAYS
Typical clean-rollout timeline for 25-50 user firm
#1
Cyber-insurance underwriter disqualifier when missing
Why MFA Rollouts Stall — and What Fixes Them
Three patterns account for nearly every stalled rollout we see:
01
Shared accounts that nobody wants to fix
info@, billing@, the practice's scheduling email, the office's "reception" login — everyone uses them and nobody knows whose phone the MFA prompt should go to. The fix is identity-bound named accounts plus a Microsoft 365 / Google Workspace shared mailbox feature for the visible address.
02
Legacy software that doesn't natively support MFA
An older line-of-business application that authenticates against legacy IMAP, an on-prem accounting system without SAML support, a niche EHR module. The fix is wrapping the authentication via a SAML/OIDC bridge, a conditional-access gate at the network level, or scheduled migration off the legacy system.
03
Owner / partner exemption
"Just leave it off on my account — I have too many systems." This is the single most common audit-fail pattern. Owners are the highest-value targets and the most-impersonated identities in BEC attacks. The fix is hardware security keys (YubiKey) on owner / partner accounts — faster than push notifications, no phone needed.
The 5-Phase Rollout
Order matters. Each phase derisks the next. The whole rollout for a 25-50 user firm typically completes in 60 days.
Phase 1 — Inventory & Tier
Week 1
Build a spreadsheet of every account, every system, every shared inbox. Tier each account by risk: tier 1 = admins & finance, tier 2 = email & remote access, tier 3 = SaaS apps with sensitive data, tier 4 = everything else. The rollout works through tiers in order.
Phase 2 — Tier 1: Admin & Finance
Week 2-3
Hardware security keys for admins and owner/partner accounts. TOTP apps (Microsoft Authenticator / Google Authenticator / Authy) for finance staff. Test the recovery path end-to-end before moving on — lost-phone scenarios, locked-out scenarios.
Phase 3 — Tier 2: Email & Remote Access
Week 3-5
Enable MFA enforcement on the email tenant (M365 Security Defaults or a Conditional Access policy; Google Workspace 2-Step org-wide enforcement). Enable MFA on the VPN / remote-access gateway. Announce the change a week in advance. Provide enrollment screencasts — the help-desk volume drops 80%.
Phase 4 — Tier 3: SaaS Apps With Sensitive Data
Week 5-7
Banking, payroll, HR, EHR, practice management, customer database, client portal. Each app gets its own enrollment notice. If an app does not support MFA in 2026, that is a flag to migrate — not a reason to leave the gap open.
Phase 5 — Tier 4: Everything Else + Legacy Wrap
Week 7-9
All remaining apps get MFA. Legacy systems that genuinely cannot support modern MFA get wrapped — either by a SAML/OIDC bridge or by a conditional-access gate at the network level. Document the exceptions formally; they become the items on the upgrade roadmap.
Method Choice — TOTP App vs SMS vs Hardware Key
Hardware Security Key (YubiKey, Titan, Feitian)
Strongest
Owners, partners, IT admins, finance leadership. Resistant to phishing and SIM-swap. $25-$50 per key, one-time cost.
TOTP Authenticator App (Microsoft Authenticator, Google Authenticator, Authy)
Strong
Default for the rest of the team. Works offline, supports backup codes. The right answer for 80% of users.
Good UX. Number-match prevents push-bombing attacks. Microsoft enforces this by default in 2024+ tenants.
SMS Text Message
Floor only
Better than nothing, but vulnerable to SIM-swap attacks. NIST has recommended against SMS as a primary MFA method since 2017. Use only when nothing else is supported.
The Communication Template That Works
Push-back drops when the announcement is clear. The pattern we use:
1 week before enforcement: announcement email with the date, the reason (one sentence: cyber insurance / regulatory / customer trust), and a 90-second screencast of the enrollment flow
3 days before: reminder + link to a help-desk slot if the user wants assistance
Enforcement day: short message confirming the change is live, with the recovery process explained
Day +7: brief check-in: any issues, recovery codes confirmed, any apps that are not working as expected
Day +30: phishing simulation to verify the new security posture
"Every cyber-insurance application asks about MFA coverage. The firms answering ‘yes, on most accounts’ are paying 20-40% more in premium than the firms answering ‘yes, on every account’ — and many carriers will not bind a new policy at all without 100%."
Steve Condit, Simply IT
// Key Takeaway
The difference between partial MFA and complete MFA is not technical — it is operational. Inventory, tier by risk, roll out in five phases, communicate clearly, and document the exceptions. Sixty days of disciplined execution gets you to 100% — and to the controls position that makes the next cyber-insurance renewal cheaper instead of harder.
Founder & Owner, Simply IT · US Marine Veteran · 30+ Years IT Experience
Steve Condit founded Simply IT to bring enterprise-grade IT management to small and mid-sized businesses across North Central Florida. With over 30 years of IT experience and a background in the US Marine Corps, Steve built Simply IT around the principle that local businesses deserve the same quality of technology partnership that large companies take for granted — without long-term contracts or national call center support.