Why Using Two Factor Authentication Is Important

A lock sat on the corner of an open laptop with a phone

We know! We get it! It’s annoying. That extra step between you and your inbox, your files, banking, shopping accounts and more. But two-factor authentication (2FA) is one of the simplest, most effective ways to protect your digital life. 

Passwords alone are no longer enough. Even if yours is long, complex, and unique, it might already be floating around the dark web.  A recent study revealed that over 19 billion passwords were leaked between April 2024 and April 2025, and 94% of them were reused or weak (Cyber News, n.d.) Only 6% were unique, leaving most users vulnerable to forms of cyber-attacks such as dictionary attacks and credential stuffing.

Even worse, 80% of data breaches are caused by weak or stolen passwords.

Even if you’ve never shared your password and it is complex, I bet you have all used the same password more than once? The problem is that your email address, username and passwords may have been used on another website which may have inadvertently leaked that data. They can use that email address and password to attempt to access other websites such as Microsoft 365. it’s an almost weekly occurrence that there is a new news story where a well-known company has been breached and seen it’s secure data leaked

For example, if you are thinking of applying for a job serving burgers, fries and Happy Meals….. you might want to think again!

To give you a good example, security researchers Ian Carroll and Sam Curry discovered that McDonald’s AI hiring platform, McHire, had a severe vulnerability (McHire, n.d.). The system Mchire used the password “123456” for administrator access, one of the most commonly guessed passwords in the world, using this information it took researchers 30 minutes to obtain:

  • Gain full access to the backend system.
  • View and extract names, email addresses, phone numbers, and chat logs of job applicants.
  • Identify 64 million records potentially exposed

McHire is powered by an AI chatbot named “Olivia”, developed by a company called Paradox.ai, which automates the recruitment process for McDonald’s franchise locations. It will conduct initial candidate screenings collecting their contact details and resumes and guiding applicants through assessments using natural language processing.

  • Conducts initial screenings.
  • Collects contact details and résumés.
  • Guides applicants through assessments using natural language processing.

The backend infrastructure storing these interactions was poorly secured, allowing unauthorised access to not just data, but sensitive and confidential data of 64 million job applicants(1). That’s nearly the population of the UK! This is just one example of how easy it is to obtain a large database of email addresses and passwords.

Microsoft 365 is one of the most heavily targeted systems for password-based attacks. It is used by millions of businesses for email, file storage, and collaboration and a single compromised account can give access to emails, SharePoint, Teams, OneDrive, and even admin controls.Microsoft 365 is one of the most heavily targeted systems for password-based attacks. It is used by millions of businesses for email, file storage, and collaboration and a single compromised account can give access to emails, SharePoint, Teams, OneDrive, and even admin controls.

Phone held in front of a laptop screen with a password entry menu on the phone screen.

We often find there is some resistance when it comes to implementing Two-Factor Authentication and that’s because it is annoying. We know! We get it!  Obtaining your email address is easy for attackers, often it’s available on websites or LinkedIn. Without Two-Factor Authentication, an attacker just needs some sophisticated software to guess your password or the password is found in another website breach.

Embrace the inconvenience. Enable Two-Factor Authentication wherever possible, it adds a critical extra layer of protection making it exponentially harder for attackers to gain access, even if your password slips into the wrong hands.

Choose strong, unique passwords, stay vigilant for phishing attempts, and never underestimate the value of regular security training.

At CIM Software, we specialise in proactive IT support, continually monitoring your systems for emerging threats, ensuring updates and security measures are always up to date. We do this through the implementation of state of the art endpoint protection and encryption, providing reliable server, desktop and Microsoft backups. We also ensure the highest level of email security making your data safe proving peace of mind to you and your clients. For more information about how we can help, please feel free to contact us.

Contact The Team

Enter your message in the form below and we’ll be in touch.

"*" indicates required fields

Name*

You May Also Like...

We’re pleased to announce that the latest release of Cim200, v2025 R2, is here. This release of Cim200 is compatible with Sage 200 Professional v2022 R1 onwards and contains…
The latest release of Cim50, version 2025.1 is here! This version of Cim50 is only compatible with Sage 50 Accounts v33. Alongside providing compatibility with the latest release of…
Southern Manufacturing 2026 will be taking place from the 3rd to the 5th of February at the Farnborough International Exhibition Centre, and CIM Software is pleased to announce that…
Whilst our office does close over Christmas to allow our staff to enjoy the festive season, our emergency support staff will be on hand to support our customers with…
Sage 50 Accounts v33 is now available to download. This is Sage’s latest release of their Sage 50 Accounts solution and includes several new features and updates to existing…
Sage 200 Manufacturing has now reached the end of its lifecycle, and all official support will come to an end on 31 December 2025, meaning it’s time to find…

Our Software: