A guide to boosting cybersecurity in your environment with Multi – Factor Authentication

Jeroen Jansen

Jeroen Jansen

GTM Manager Security

Read Time, 3 min.

You are the CEO of a large organization. It’s Saturday evening and you’re at home alone. When suddenly…

Your phone rings!

It’s your CISO. “Something terrible is happening,” they say. “We’re being hacked, right now!”

The attack has already paralyzed all your system and admin accounts – forcing multiple virtual machines within your Azure cloud environment to become activated and start using large amounts of data.

What do you do?

How does it start?

If you think this scenario sounds unlikely, then think twice. It’s much more common than you imagine. Cyberattacks are an increasingly ordinary occurrence in todays’ business world. They’re also often extremely easy to trigger – even a simple phishing email can cause them. Someone accidentally clicks on a link and if you or your organization haven’t taken the right measures, the attacker will have an open window to get in and take over.


Criminal organizations are often just as well organized as your average multinational company. One department is responsible for sending phishing emails, while another does research on people – selecting who to target based on their vulnerability. Meanwhile, there’s a specific division developing ransomware to encrypt data, and another tasked with negotiating and placing initial offers with the victim.


All of these are cells that work together on an outsourcing model that is highly professional and aimed at major victims. Especially lately. We’ve recently seen a major shift from hail shooting to targeted operations. Because the larger the fish, the higher the income.



Hackers don’t have to hack, they just log in. Once your username and password have been stolen, the hacker is inside your network. Some criminals know a particular network even better than the system administrators themselves.


You don’t see them. They just stay under the radar until the moment comes to strike. As a person receiving regular emails, you should always be on your guard. You should be able to recognize a strange email as soon as you get it.


However, hackers are becoming more and more skilled. Sometimes it’s easy to miss something potentially malicious. They might use psychological tricks, such as time emergencies, to pressure you to click. So if you ever do click on the wrong e-mail, make sure that the impact is limited. Continuously backing up your files and data points is a proven, well-functioning defense strategy. You avoid losing everything, and at the same time you guarantee continuity.


The first line of threat protection starts with Multi-Factor Authentication

Endpoint protection starts with Multi-Factor Authentication (MFA). This means that every account within an organization should be protected with multiple types of identity protection. Priority should be given to Administrative and Systems accounts, which are more often targeted.

Safeguarding these accounts is your first line of defense to protect your (cloud) environment and improve your cloud security posture.

Using MFA on admin and system accounts is just one of many initiatives you can implement. It’s also important to think about the rights these accounts need. Does an admin account need access to other (public) networks? Are the rights of a system’s accounts still valid after many years?

Have you created a ‘broken glass’ account for worst case scenarios?

A lot of thinking and planning is needed when it comes to keeping your environment safe.


We’re here to help

At Microsoft, we understand that all this can be slightly overwhelming. But we’ve got you covered. To help you prevent data loss and secure data, we’ve created content on how to protect your environment.

The video above gives you an overview on how to enable MFA on admin accounts and on how to create broken glass accounts. We also show you how to monitor these accounts and manage non-used MFA accounts. There is also a presentation that you can download with further tips and tricks.

And, last but not least, we wrote a whitepaper about the nine basic rules you can implement to keep your environment and your users safe against hackers.


Protect your organization in a few simple steps.

Explore the benefits of multifactor authentication now.

Discover more related articles per industry:


  • a person sitting at a table using a laptop computer

    Reimagining education: From remote to hybrid learning

    The COVID-19 pandemic has generated a torrent of individual and small-group responses as to how education could be transformed. We have found a groundswell of interest in the question, “How best to take advantage of the new opportunities arising from the disruption?” What people desperately need are opportunities to team up and find pathways of […]

  • Cloud

    A guide to GDPR for universities

    With the EU’s new General Data Protection Regulation coming into effect on May 25, understand how universities like yours can take the right steps towards compliance with this free eBook – and other useful resources. Your university on a journey on a journey Your university is on a journey with lots of ‘data subjects’. They’re […]


  • a large old building with many windows

    Raad van State: Creating a virtual courtroom through a remote-working solution

    “This situation has proven that with the right means, support and trust, you can remove half of the desks in your building – and in that sense, I don’t think we’ll ever see 700 people at the same time in the office again.” Ron Lamers, Project Manager at Raad van State, is talking about the […]

  • How VR Group is using automation to secure Finland’s railways

    How VR Group is using automation to secure Finland’s railways

    “Being at the helm of a critical piece of infrastructure, we have a huge responsibility towards our partners and clients. That’s why safety and security are crucial elements of what we do and how we operate.” Mikke Maronen, CISO at Finnish railway company VR Group, is talking about the importance of protecting his business from […]


  • Healthcare professionals operating on a patient

    Maasstad Hospital: Working as one medical team during a crisis

    In times of crisis, an organization looks to its leadership for guidance. As COVID-19 spread through Europe in early 2020, Maasstad Ziekenhuis Hospital CEO Peter Langenbach had planned to lead his hospital’s crisis response as he would any other – being present and visible, leadership traits instilled in him during his time in the Dutch […]

  • a woman standing in front of a screen

    Istituto Neurologico Carlo Besta: providing essential patient care from a distance

    “Telehealth was a technology we’d been planning to implement for a couple of years. But then almost overnight everything changed – it became a must-have platform the hospital needed today.” Francesca De Giorgi, CIO of Italian research hospital IRCCS Carlo Besta, reflects on the recent challenges her team faced when social distancing measures imposed by […]


  • a woman smiling for the camera

    Etex Group: Future-proofing employees to work anywhere across the world

    When COVID-19 spread across Europe in early 2020, businesses entered a new digitally-dependent age. Social distancing measures had asked offices of all shapes and sizes to close their doors, sparking organizations to quickly find other virtual ways for colleagues to meet and collaborate remotely. But for Belgium building material specialist Etex, this was a step they were ready for – having already implemented a cloud-based infrastructure and collaboration tools […]

  • Etex

    Etex uses modern tools to unite its business and better focus on customers

    When it comes to construction, all components must come together in a timely manner in order to produce the optimum product. While Etex, a Belgian building solution manufacturing company, helps make this a reality on a day-to-day basis, it wanted to find a way to enhance productivity and collaboration internally. With locations across more than […]


  • HeadBrands is ready for the future with Microsoft 365 Business

    HeadBrands is ready for the future with Microsoft 365 Business

    Since its creation in 2010, HeadBrands has continued to grow, rapidly becoming the leading retailer of hairdressing products in Scandinavia. HeadBrands needed a modern IT solution to increase its business productivity and improve collaboration, both within the company and externally. Its response to this challenge was to replace most of its previous services with Microsoft […]

  • Picture from the back of a person attending a Teams meeting with 2 colleagues, discussing about a furniture fabric.

    Zuiver: Supporting both business and culture through technology

    “Since moving to the cloud, there are no limitations anymore. And I’m certain without this technology, we would not have seen the growth we have today.” Jaap Landsaat, CFO and Head of IT at Dutch furniture designer Zuiver, is talking about the profound impact technology has had on the business he co-founded more than 20 years ago. “Back then, we had 100 orders a week […]

Discover more related articles per dossier:

Customer Stories

  • a person sitting on a chair in a room

    Bridging the education gap in challenging times

    Across the globe, teachers, students and parents are dealing with a new reality: how to adapt to an educational environment that has moved from the classroom to the internet. As in many countries, the remote Faroe Islands, more than 300 kilometres off the coast of Scotland in the North Sea, has found the lives of […]

Digital Transformation

  • A smiling man wearing glasses looking at the camera

    HUS: sharing data securely to make life-saving decisions

    Illnesses and diseases don’t often play fair – an unfortunate truth that was proved by the COVID-19 outbreak in early 2020, heavily hitting healthcare organizations with challenges the world hadn’t seen in a century. Hospitals needed a rapid response to reduce spreading the virus without affecting patient care. A high-pressure situation for any institution, but […]

Security & Privacy

  • a group of people looking at a laptop

    Securing your business when staff are working from home 

    In times like these, cyber security may not be at the top of our priority lists. But it’s important to be aware of the threats that switching from on-premises to remote working conditions pose to organizations across the world. As we seek to rapidly deploy cloud-based collaboration services to help professionals work from home, we […]


  • a woman sitting at a table in front of a laptop

    3 key ways Microsoft Teams enriches higher education teaching and learning

    Whether remotely, in class or hybrid , Microsoft Teams helps to simplify and structure higher education’s day-to-day digital environment – integrating seamlessly with all the solutions you’re already using. “My teaching is now entirely based on Teams. The interaction with students and the teacher is a better level than traditional teaching” – Pasi Vahimaa, Professor, […]