Should I disable multi-factor authentication during the pandemic?

Welcome to โ€œAsk Deb from QA,โ€ a new column from MxD.

Every week, Deb from QA โ€” with decades of experience on the factory floor โ€” will answer your questions to demystify and explain the digital manufacturing industry.

Please submit your questions to debfromqa@mxdusa.org


Deb: Our employees are working from home because of the pandemic, and weโ€™re running into so many tech problems that weโ€™re disabling multi-factor authentication. Is this a bad idea?

Yes. This is a terrible idea.

Thanks for reading, folks, see you next week!

OK, let me explain this a bit deeper. Multi-factor authentication verifies your identity by requiring more than one password before signing you into a network. For example, you may log in with a password and then have to enter another code thatโ€™s texted to your phone, just to doubly make sure itโ€™s you and not some evil hacker. 

Itโ€™s the physical world-equivalent of having locks on your door and a security guard at your front desk. 

When you turn off MFA, youโ€™re essentially inviting anyone and everyone to walk into your factory, roam around unescorted, and dig through your filing cabinets. Are you fine with that?

If youโ€™re working from home, thereโ€™s also a decent chance youโ€™re using a personal computer  โ€”  not every organization can issue a corporate laptop. So now, youโ€™ve exposed your company data to more risk, just as youโ€™ve removed the extra protection of multi-factor authentication. Not good. 

Plus, your home WiFi probably isnโ€™t as secure as your corporate network. Also not good. (Pro tip: Your home WiFi network should have a password โ€” and it should not be โ€œpassword.โ€) 

The thing to know about cybersecurity is youโ€™re never 100% immune from hackers; itโ€™s all about reducing risks. Think of MFA as using hand sanitizer or wearing a face mask. Youโ€™re increasing the odds that bad things wonโ€™t happen. 

There are some good resources out there about cybersecurity and how companies can implement safer work-from-home protocols: Check out this video and article from friend-of-MxD Brian Haugli, who once led the Pentagonโ€™s program for cybersecurity. Brian knows what heโ€™s talking about.

Bottom line: Itโ€™s never a good idea to get rid of multi-factor authentication, and certainly not now.

Iโ€™ve got a feeling that remote working will become more regular in our industry, even after this pandemic passes. Why not lay the groundwork now, so you can feel confident that your most sensitive data remains secure?

Assuring quality,
Deb

Watch Brian Haugliโ€™s excellent recent webinar for MxD โ€œCybersecure While Working from Home,โ€ where he gives guidance for manufacturers with a remote workforce during the pandemic. 


Deb from QA wants to hear your questions. Send โ€˜em to DebfromQA@mxdusa.org and sheโ€™ll answer as soon sheโ€™s done with her shift.  

More News

Articles

2026 Cybersecurity Outlook: โ€˜Hardening Ourselves Against Attacks Has Never Been More Importantโ€™

In 2025, cybercriminals leaned heavily on artificial intelligence (AI) to automate attacks at...

Read More
Articles

The Year in Cybersecurity: AI, CMMC, and Lessons From 2025โ€™s Top Attacks

For manufacturers and suppliers, especially those in the Defense Industrial Base, cybersecurity in...

Read More
Articles

6 CMMC Tips: Choosing a Third-Party Assessor (C3PAO)

Defense industry suppliers know โ€” or should know โ€” that the time has...

Read More