When the Canadian Centre for Cyber Security published fresh guidance on multi-factor authentication (MFA) in early 2024, the message was blunt: passwords alone aren't cutting it anymore.
Law firms, clinics, contractors, and shops across Ontario are all sitting on the same pile of risk:
- Email accounts that can be reset with a single click
- Cloud apps with weak or reused passwords
- Remote access into the office with no second check
If someone guesses or steals a password, they're in. No extra challenge. No alarm. Nothing.
That's the whole point of MFA: even if a password leaks, attackers still have to get past a second barrier.
What MFA Actually Is (No Buzzwords)
MFA just means: instead of "something you know" (a password) being the only key, you add at least one of:
- Something you have – a phone app, hardware key, SMS code
- Something you are – fingerprint, Face ID, etc.
You've already used this:
- Interac: card + PIN
- CRA account: password + code to your phone
Same idea. Now we just apply it to your business.
The federal Cyber Centre and Get Cyber Safe guides both tell small and medium businesses to turn on MFA for sensitive accounts wherever possible.
Where to Turn On MFA First
If you try to "MFA all the things" on day one, your staff will revolt. Start with what hurts most if it gets popped:
Email for owners and managers
- Microsoft 365, Google Workspace, or your hosted email
- These inboxes control password resets for everything else
Remote access into the office
- VPNs, remote desktop gateways, management portals
- Anything that exposes your internal network from the internet
Financial and line-of-business systems
- Banking and payment portals
- Accounting (QuickBooks Online, Xero if you use it, etc.)
- Practice management or case/file management systems
Admin accounts everywhere
- Domain admins, global admins in M365/Google
- Cloud console admins (Azure, AWS, etc.)
If you just cover that list, you've closed off a big chunk of the "easy" attacks.
Which MFA Options Make Sense for an SMB?
Here's the trade-off in plain English.
1. SMS codes (text messages)
- Pros: Easy to roll out, people understand it
- Cons: Can be intercepted or SIM-swapped in high-value attacks
For most small businesses around the Escarpment, SMS is still better than nothing—but don't stop there if you can avoid it.
2. Authenticator apps (Microsoft, Google, Duo, etc.)
- Pros: More secure than SMS, works even when travelling; recommended in most Canadian legal/cybersecurity guidance
- Cons: Slight learning curve, need to handle lost phones carefully
This is usually the sweet spot: secure enough, not too painful.
3. Hardware keys (YubiKey, Feitian, etc.)
- Pros: Very strong, hard to phish, good for high-risk roles
- Cons: Cost per user, can be lost, overkill for some staff
Nice option for owners, finance, and IT, especially when you're handling sensitive client data or regulated information.
How to Roll Out MFA Without Chaos
Think of this like doing renos on a live site—you can't shut down operations "for security upgrades."
Step 1 – Pick your priority app and pilot
Start with the system that would hurt most if compromised. For many SMBs, that's email.
- Pick 3–5 staff (including you) as a pilot group
- Turn on app-based MFA for them
- Work out the rough edges: "What if I lose my phone?", "What if I'm out of the country?"
Step 2 – Write a one-page staff explainer
Nothing fancy. Cover:
- What MFA is, in one paragraph
- Why you're doing it ("We don't want our client data or payroll messed with")
- What they'll see on their phones
- Who to call if it breaks
Canadian small-org guidance keeps hammering this point: user awareness is half the battle.
Step 3 – Roll out by group, not all at once
Suggested order:
- Owners, managers, finance
- Staff who access systems remotely
- Everyone else
Schedule it like any other change:
- Do it early in the week, not Friday at 4 p.m.
- Block off a few hours where someone can walk around and help
Step 4 – Lock down backup methods
This is the part everyone forgets:
- Remove personal email addresses as password reset options where possible
- Avoid "security questions" that are just Googleable facts (mother's maiden name, first school, etc.)
- Make sure backup codes are stored securely (not taped to a monitor)
Handling the "This Is Annoying" Pushback
You'll hear it. Every business does.
The answer isn't to lecture staff about cybercrime—it's to make it:
- Predictable: Same app and process for all major systems
- Fast: Push notifications instead of long codes where possible
- Supported: When someone gets stuck, they get real help, not a shrug
You can also be honest: several Canadian breach cases and privacy decisions now look at whether reasonable safeguards like MFA were used—especially for sensitive records.
Quick MFA Checklist for the Golden Horseshoe
By the end of the next quarter, aim for:
- ✅ MFA on email for all staff
- ✅ MFA on remote access and admin accounts
- ✅ Written process for lost/stolen phones
- ✅ One-page staff guide in plain language
- ✅ Backup codes stored safely, not randomly
It's not glamorous. Nobody will clap for you. But next time there's a story about a credential-stuffing attack or mailbox takeover, you'll be glad you spent a couple of mornings getting this done instead of rebuilding your business from scratch.
Need Help Setting Up MFA?
Let CyberLeda's team handle your MFA deployment properly. Get a free consultation today.
Schedule Consultation