Cybersecurity Denial and Cure

Date: 2021-07-08
Author: Will Houry, VP of Sales

Cybersecurity Denial and Cure

Many small and medium-sized enterprises (SMEs) have many reasons why they are less concerned about cybersecurity than their larger cousins, but the truth is they should be just as worried. One of the easiest and most secure forms of cybersecurity is PKI-based multi-factor authentication (MFA), yet time and again the lack of this basic measure allows easy access for hackers.
Here are the top 5 reasons companies give for shying away from MFA, and some of our counterarguments:

1. Implementing MFA is overkill for us. It’s more sophisticated than we need. Everyone in our organization already has a smartphone, so we can get by using a One Time Password (OTP) app instead.

  • While this argument may have been valid several years ago, since then it has been well proven that OTP is not secure enough today. Short message service (SMS) OTP is now used far less frequently because of the risks of SIM swapping or even interception since the communication is not encrypted. OTP generated by a proprietary app is better but could still be intercepted by a malware application.
  • User convenience also must not be underestimated. Performing an OTP authentication to access each application is an extra step for the end user, which often has a negative impact on user experience and efficiency.

2. We don’t have the bandwidth/budget to implement PKI/multifactor authentication…

3. We are looking at other technologies/ Having X is enough/ My firewall is protected and we use complex passwords…

  • Certainly there are other technologies but MFA with hardware-based PKI is the only cybersecurity solution on the market today allowing the highest level of security cost-effectively for many different use cases such as domain logon, remote authentication, digital signature and encryption.
  • Closing the perimeter with a good firewall is a start, but it’s not enough. A Forrester report highlighted that 83 percent of organizations that lack a mature Identity & Access Management (IAM) system are exposed to more expensive breaches. They also showed there that the risk of breaches drops by 50 percent at the most mature compared to the least mature organizations.
  • Complex passwords are still exposed to brute force and phishing attacks. They are also inconvenient for end users. Not surprisingly, the risk of password reuse for both private and professional use is very high.

4. Aren’t PKI devices old technology?

  • Like many technologies, PKI technology is continually evolving, with applications including smartcards, USB tokens, mobile devices, virtual smart cards or Windows Hello for Business containers. Hardware-based PKI is still the most secure and reliable technology today.

5. My information is not important/The business is too small for anyone to try to steal our data

Are you or others at your organization suffering from cyber denial? If you need help talking through any of these issues with the decision makers at your company, give us a shout here (and click the CHAT button). We are happy to help you make the very justified case for PKI-based MFA at your organization.


Our product suite provides all the software tools to administrate and manage credentials in a secure and convenient way.

Start here

Free Product Trial

Versasec provides enabling IT security products centered on the usage of security devices such as smart cards. Our solutions enable customers to securely authenticate, issue and manage user credentials more cost effectively. Get a free product trial.

Job Openings

We are always looking for new exceptional persons to join our team! Find out more about our job openings.

Versasec Support

Versasec customers with an existing support and maintenance contract can access the Versasec Support Portal, offering extensive professional support and maintenance services. The Versasec Support Portal offers a variety of services, allowing for customers and any site visitor to communicate directly with support engineers.

Contact Support

Company Blog

Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger role in keeping corporate data safe as well as brand reputations intact.

Visit our Blog
Share this article