• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

The Cost of Ignoring Cybersecurity Best Practices

January 30, 2025 by Collin Knauer

Home » Success in Action » The Cost of Ignoring Cybersecurity Best Practices

Cybersecurity. MFA screen.

Ignoring Security Warnings

Cybersecurity is no longer a luxury, it is a necessity. Businesses must take proactive steps to protect sensitive data and defend against increasingly sophisticated cyber threats. One company’s failure to implement essential security measures, Conditional Access Multifactor Authentication (MFA), Endpoint Encryption, and strict device policies – led to a devastating cyberattack that cost them over a million dollars and put their future at risk.

Despite repeated recommendations from cybersecurity professionals, the company refused to update its security protocols. IT specialists had urged them to adopt Conditional Access MFA and Endpoint Encryption, emphasizing that Microsoft’s Legacy MFA alone was not enough to prevent modern cyber threats. The company believed their existing defenses were sufficient. Their reluctance to strengthen security controls left them vulnerable to an attack that could have been prevented.

The Attack Begins

The breach began when a remote employee accessed company records using a personal device. Without corporate security controls in place, the employee’s computer lacked critical protections such as antivirus software and a VPN. This oversight provided an opening for an attacker, who installed a keylogger to capture every keystroke, including usernames, passwords, and the employee’s MFA token. Armed with this information, the hacker bypassed authentication and gained unauthorized access to the employee’s account.

At the time, the employee was negotiating a major vendor purchase worth $975,000. The hacker, now embedded in their email communications, launched a Man-in-the-Middle (MitM) attack, intercepting and manipulating messages to redirect funds into fraudulent accounts.

A Million-Dollar Mistake

The hacker carefully created emails posing as the employee, instructing the vendor to process payments. Since the attacker had control of the compromised MFA system, the fraudulent transactions appeared legitimate, and the employee unknowingly approved the requests. Over the course of several weeks, the company wired a total of $1,025,000 to the hacker. It was not until the vendor followed up about the missing funds that the company realized something had gone wrong. By then, the money was gone, and the damage was irreversible.

The Fallout

The financial loss was severe, but the consequences extended far beyond the stolen funds. Losing over a million dollars in fraudulent transactions put an enormous strain on the company’s cash flow. Clients and partners lost confidence in the organization’s ability to protect sensitive information. To compensate for the financial loss, the company was forced to lay off several employees, causing internal instability. Clients canceled contracts, worried that their own data could be at risk. The company also faced extensive legal costs, and its cyber insurance provider refused to cover the claim due to non-compliance with security requirements.

Turning the Lessons Into Action

In the wake of the attack, the company had no choice but to overhaul its cybersecurity strategy. They turned to SWK to implement Conditional Access MFA, enforced Endpoint Encryption, and required employees to use company-issued devices. Comprehensive security awareness training was introduced to educate staff on phishing tactics and social engineering threats.

This case serves as a reminder that cybersecurity is not just an IT concern—it is essential for business survival. A failure to invest in proactive security measures ended up costing this company far more than the price of prevention. By strengthening security frameworks and training employees to recognize threats, businesses can significantly reduce their risk of falling victim to cyberattacks. Waiting until a breach happens is not an option.

Let’s Find a Solution Together

By partnering with SWK, you’re taking a step toward success. Contact us today and learn how we commit to enabling success for every one of our clients.

Category: Success in Action, Blog, Cybersecurity

Sidebar

Recent Posts

  • How Your ERP Software Impacts Tariff Costs
  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Cargo ship "Tokyo Triumph" loaded with shipping containers in various colors, representing international trade and supply chains affected by tariffs impacting manufacturing operations.

How Your ERP Software Impacts Tariff Costs

Read moreHow Your ERP Software Impacts Tariff Costs
Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand