







Gibraltar: Thursday, 19 March 2026 – 07:00 CET
Perception vs Reality in Authentication: What UK SMEs Must Fix Now – Analysis of Yubico’s 2025 authentication report.
By: Iain Fraser – Cybersecurity Journalist
Published in Collaboration with SECURUS Communications
Google Indexed on: 190326 at 09:56 CET
SMECyberInsights.co.uk | First for SME Cybersecurity News
#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity
Perception vs Reality in Authentication: What UK SMEs Must Fix Now – Analysis of Yubico’s 2025 authentication report.
Authentication is the front door to your business systems; and UK small business cyber threats increasingly start by picking that lock. Phishing (fraudulent messages designed to trick someone into handing over passwords or codes) and account takeover feed ransomware, invoice fraud, and data breaches. The uncomfortable truth is that many organisations feel “covered” because they have passwords and “some MFA”; but attacker techniques and user habits have moved on.
Yubico’s 2025 Global State of Authentication survey highlights a perception gap; a notable share of respondents still believe a simple username and password is the most secure way to protect an account. That belief is exactly what modern phishing kits exploit at scale.
Insight and definitions: the terms that drive the real risk
Authentication is how a system proves a user is who they claim to be. The main methods are:
* Password: something you know. Easy to reuse, guess, steal, or phish.
* MFA (multi-factor authentication): using two or more factors; for example a password plus a code or an app approval. MFA reduces risk; but not all MFA is equal.
* Phishing-resistant MFA: methods that cannot be tricked by lookalike login pages. A common example is FIDO2 security keys (a physical key that proves presence and binds the login to the real website). NCSC describes stronger and weaker MFA types and why phishing resistance matters.
Why “perception vs reality” bites SMEs:
Many SMEs rely on Microsoft 365, Google Workspace, Xero, QuickBooks, and remote access via outsourced IT. One compromised mailbox can reset other accounts, intercept invoices, and approve payments. Shared admin accounts and “temporary” exceptions for directors are also common; and attackers love exceptions.
Actionable guidance: high-impact steps you can do this month
Start with the systems that, if compromised, would stop trading: email, finance, and admin access.
1) Upgrade MFA where it counts
* Turn on MFA everywhere; then prioritise phishing-resistant MFA for admins, finance users, and anyone approving payments.
* Avoid SMS codes where possible; they are better than nothing, but not the strongest option. Follow NCSC’s recommended MFA types. (Source: NCSC links above)
2) Fix the “shared admin” problem
* Give each admin their own named account; use least privilege (only the access they need).
* Keep one emergency “break glass” admin; lock it down with a strong recovery process and monitoring.
3) Reduce password risk quickly
* Use a reputable password manager (a secure vault that creates and stores unique passwords).
* Block known weak passwords; and stop password reuse across business tools.
4) Align to UK expectations without over-engineering
* Map actions to Cyber Essentials controls; especially access control and secure configuration. This also helps with supplier due diligence.
* Treat authentication as part of “appropriate security”; UK GDPR expects appropriate technical and organisational measures, and poor access controls regularly feature in breach lessons.
A realistic SME attack scenario (what “good enough” looks like until it is not)
A director receives a “SharePoint document” email. They sign in and approve an MFA prompt, assuming it is routine. The attacker immediately creates an inbox rule to hide bank details emails, resets the finance system password using the mailbox, and swaps supplier payment details. No malware required; just weak authentication choices and a busy day.
Quick checklist: 10-minute board-level test
* Do all email and finance accounts have MFA enabled?
* Do admins and finance users have phishing-resistant MFA?
* Are there any shared admin logins?
* Can staff spot and report suspicious MFA prompts?
* Is there a documented recovery process for lost phones and keys?
SECURUS Communications Ltd
Securus is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the ‘cloud generation’ of enterprises. Securus priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.
Contact Securus
Securus Communications Ltd
Station Road, Landmark house, Hook, England RG27 9HA, GB
T: Enquiries: 03451 283457 | Service Desk: 03451 283458
Securus on LinkedIn | Securus on “X” | https://securuscomms.com
