MFA for Email Admins and Business Owners
Admin accounts without MFA are the #1 way attackers get full access to your systems.
Last updated: March 20, 2026
Here's what attackers want most: your admin accounts.
A regular employee's email account gets them some emails, maybe some contacts. Valuable, but limited.
A Global Admin account in Microsoft 365 gets them everything. Every email. Every document. Every user's credentials. The ability to add new accounts, remove existing ones, change permissions, access billing. They own your entire digital presence.
This is why MFA on admin accounts isn't optional. It's the most important security control you can implement.
Why Admin Accounts Are Different
Higher value = higher targeting Attackers specifically phish for admin accounts. They know if they get the CEO's password, they get everything. Your spam filter doesn't matter—they're using your own email servers to send.
Bigger blast radius If a regular employee's account is compromised, you lose that person's data. If an admin account is compromised, you potentially lose everything.
Often weaker security Here's a dirty secret: admin accounts often have weaker security than regular accounts because they're "technical" and the owner "knows what they're doing." The CEO uses a simple password. The IT person uses the same password everywhere.
What MFA Actually Stops
Password-based attacks Phishing, credential stuffing, brute force—MFA stops all of these. Even if an attacker has your password, they don't have your phone or your hardware key.
Breached password reuse You reused a password on a breached site. Attackers have it. They try it on your admin account. Without MFA, they get in. With MFA, they need the second factor.
Keylogger malware Sophisticated attacks sometimes install keyloggers. They capture your password but not your MFA code. Still locked out.
What MFA Doesn't Stop
Push bombing Attacker has your password. They repeatedly try to log in, triggering MFA push notifications to your phone. You, frustrated by the spam, approve one. Now they're in.
Solution: Use a authenticator app with a time-based code instead of push notifications. Or enable number matching in Microsoft 365.
MFA bypass via legacy protocols Some older email apps don't support MFA. Attackers configure those apps to use your credentials, bypassing MFA entirely.
Solution: Block legacy authentication at the tenant level.
Compromised MFA device Attacker steals your phone. Unlocks it. Gets your authenticator codes. Now they can authenticate as you.
Solution: Use hardware keys (YubiKey) for highest security. Keep devices physically secure.
MFA Methods Compared
SMS (Text Message)
- Convenience: High
- Security: Low-Medium
- Cost: Free
- Problems: SIM swap attacks, SMS interception
Phone Call
- Convenience: Medium
- Security: Low
- Cost: Free
- Problems: Call forwarding, social engineering
Authenticator App (TOTP)
- Convenience: Medium
- Security: High
- Cost: Free (Microsoft Authenticator, Google Authenticator)
- Problems: Push bombing, device theft
Hardware Keys (FIDO2/YubiKey)
- Convenience: High (just plug in or tap)
- Security: Highest
- Cost: $20-$80 per key
- Problems: Lost keys, initial setup cost
Windows Hello / Biometrics
- Convenience: High
- Security: High
- Cost: Free (built into Windows)
- Problems: Device-dependent, some phishing vectors remain
What Can Go Wrong
"The owner lost their phone and couldn't log in" MFA is enabled but there's no backup. The owner is locked out of admin access. Business grinds to a halt.
Solution: Generate backup codes. Store them offline (printed, in a safe). Register a second authentication method as backup.
"Legacy app stopped working" The invoicing software doesn't support MFA. User configured it with the old password, now the password is changed. App breaks.
Solution: Use app passwords for legacy systems—but understand this creates a bypass. Better: upgrade the legacy software or use conditional access to allow MFA-less access from trusted locations only.
"The new employee can't set up MFA" No one told them to. They're using password-only auth. They get phished. Now the attacker has access.
Solution: Require MFA setup before first login. Set it as a policy.
"Push notification fatigue" User gets 20 push notifications a day from various apps requesting access. They start approving without looking. Attacker exploits this.
Solution: Use TOTP codes instead of push. Enable number matching in Microsoft 365.
What It Costs
Authenticator app: Free
- Microsoft Authenticator
- Google Authenticator
- Authy
Hardware keys: $20-$80 per key
- YubiKey 5 Series: $20-$55
- Google Titan: $30-$70
- Feitian ePass: $15-$50
MFA management platform: $0-$6/user/month
- Built-in Microsoft 365 / Google Workspace MFA: Free
- Third-party MFA management (Duo, Okta): $3-$6/user/month
Recovery (if locked out):
- Account recovery process: Free but time-consuming
- Emergency break-glass access: Requires advance planning
Minimum Viable Implementation
Today
-
Enable MFA for all Global Admins. Every admin account. No exceptions. Do this now.
-
Use authenticator app, not SMS. Microsoft Authenticator or Google Authenticator. Both are free. Better security than SMS.
-
Generate backup codes. Print them. Store them somewhere safe (safe deposit box, home safe). This is your "I lost my phone" recovery.
This Week
-
Enable MFA for all email users. Not just admins. Everyone who handles business email.
-
Disable SMS as fallback. If possible, remove phone number authentication as a backup option. Use only authenticator app and backup codes.
-
Set MFA policy for new users. New employees must set up MFA before they can log in. Enforce this in admin settings.
This Month
-
Block legacy authentication. Older email protocols (IMAP, POP3) don't support MFA. Block them entirely or restrict to specific IP addresses.
-
Enable number matching. In Microsoft 365, enable "Number matching" for push notifications. This prevents push bombing attacks.
-
Test break-glass access. Can you log in as admin if your primary MFA device is unavailable? Test it. Document the process.
Vendor Questions (Copy/Paste)
-
"What MFA methods do you support? Do you support authenticator apps and hardware keys?"
-
"Can we require MFA for admin role activation—meaning an admin has to re-authenticate each time they access admin functions?"
-
"What's your account recovery process if a user loses their MFA device and backup codes?"
-
"Can we block legacy authentication (IMAP/POP3) for our entire tenant?"
-
"Do you support number matching for push notifications to prevent push bombing?"
-
"What's your process for granting emergency admin access if our primary admins are locked out?"
When to Hire Help
DIY-friendly if:
- Under 20 users
- Basic Microsoft 365 or Google Workspace setup
- No complex legacy systems
- One person can manage MFA enrollment
Get professional help if:
- Over 50 users
- Multiple admin roles and departments
- Legacy systems that don't support MFA
- Previous security incidents
- Need to comply with regulations requiring MFA
Warning signs you need help now:
- Any admin account without MFA enabled
- You've had a phishing incident in the last 6 months
- Users sharing admin credentials
- No backup method for MFA (if someone loses their phone, they're permanently locked out)
- Legacy authentication enabled for your entire tenant
Related Reading
7 min · Intro
Identity Basics: Admin Roles and Least Privilege
Most breaches start with too much access. Fix it.
7 min · Intro
What Is MFA and Why It Matters
Passwords aren't enough. Here's why MFA is essential and what actually works.
6 min · Intermediate
Break-Glass Accounts: Plain English Explanation
Emergency admin accounts that bypass MFA for disaster recovery. Learn when to use them, how to secure them, and why they're your safety net, not a shortcut.
6 min · Intro
Least Privilege And Admin Accounts: Plain English
Least privilege means giving people only the access they need for their job — nothing more. It's simple, it works, and most small businesses ignore it.
7 min · Intro
MFA: What To Enable First
MFA is not optional anymore. If someone's email gets compromised, they can reset every other password. Protect email first, then everything else.