{"id":31378,"date":"2022-10-17T00:01:00","date_gmt":"2022-10-17T04:01:00","guid":{"rendered":"https:\/\/inside.wooster.edu\/technology\/?p=31378"},"modified":"2022-10-07T12:16:49","modified_gmt":"2022-10-07T16:16:49","slug":"why-mfa-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/inside.wooster.edu\/technology\/why-mfa-multi-factor-authentication\/","title":{"rendered":"Why MFA (Multi-factor Authentication)?"},"content":{"rendered":"\n<div id=\"section-g05e80a\" class=\"wp-block-gutentor-e6 section-g05e80a gutentor-element gutentor-element-image\"><div class=\"gutentor-element-image-box\"><div class=\"gutentor-image-thumb\"><img decoding=\"async\" class=\"normal-image\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2022\/10\/cybersecurity-generic.png\" \/><\/div><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-security\"><strong>Cyber Security<\/strong><\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p>When people hear cyber security, they begin to think why, or something will never happen to my account or information. It is always someone else until it happens to you. Our entire lives are surround by potentially insecure technology and accounts from banking to ordering food. Passwords and PINs are easily compromised and with new technology are easy to &#8220;guess.&#8221; (Did you know the most commonly used passwords are 12345, qwerty, and password? If you fall into any of these 3 passwords for any account, go change your passwords!) <\/p>\n\n\n\n<p>Our goal as a community is not to make your experience unpleasant when using services and software provided by the College, but for the protection of everyone accessing the information and we need your help to insure the safe use of services and software. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-mfa\"><strong>What is MFA?<\/strong><\/h3>\n\n\n\n<p>Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. Rather than just asking for a username and password, MFA requires one or more additional verification factors, which decreases the likelihood of a successful cyber attack.<\/p>\n\n\n\n<p>Multifactor Authentication (MFA) is also required by many States as regulations on information protection becomes a focus. MFA helps make sure that we are compliant with&nbsp;identity and access management&nbsp;regulations, such as SOX for financial services and HIPAA for healthcare transactions.<\/p>\n\n\n\n<div id=\"section-gdb20a0\" class=\"wp-block-gutentor-e6 section-gdb20a0 gutentor-element gutentor-element-image\"><div class=\"gutentor-element-image-box\"><div class=\"gutentor-image-thumb\"><img decoding=\"async\" class=\"normal-image\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2022\/10\/microsoft-MFA-requirement.png\" \/><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"picture-this\">Picture this: <\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-wakeup-call\"><strong>The Wake-Up Call<\/strong><\/h3>\n\n\n\n<p>You&#8217;re having a conversation with your friends at Knowlton and you receive a text saying a $300 transaction has been approved for a money transfer from your bank account. Your heart starts to race as you process that it must be some sort of mistake. You quickly log in to your online banking platform only to realizes that you are denied access. You then scramble to find a phone number while also trying to access your email to look for your last electronic statement. It hits you in that moment that your email has also been compromised when you receive an error of invalid credentials. Now the panic really hits as you frantically ask your friends for advice as to what to do next. You finally get ahold of your bank and confirm that the transaction was not you with security questions and a 4-digit pin, but the damage is done. In that time another 4 transaction were charged to your account and now your account is locked preventing you or the hacker from accessing it further. You then focus your attention on your email which you are able to access using security questions to change the password and prevent further issues. You can finally take a minute to process what has happened in the span of 30 minutes only to remember that your password manager is linked to your email account and browser for easy access. The scramble ensues as you franticly change passwords for all your accounts linked to the password manager and try to figure out what else may have been compromised. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-realization\"><strong>The Realization <\/strong><\/h3>\n\n\n\n<p>After dealing with the above scenario for weeks or even months of your life to try and reclaim your money and identity. You come to the understanding that this entire situation could have been prevented if you would have taken 2 minutes to enroll in your bank&#8217;s new security feature <strong>MFA<\/strong>. You are now the on-campus advocate for cyber security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mfa-at-the-college-of-wooster\">MFA at the College of Wooster<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div id=\"section-g33d8c9\" class=\"wp-block-gutentor-e6 section-g33d8c9 gutentor-element gutentor-element-image\"><div class=\"gutentor-element-image-box\"><div class=\"gutentor-image-thumb\"><img decoding=\"async\" class=\"normal-image\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2022\/10\/MicrosoftAuthenticator_App_NoBackground_small-1.png\" \/><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The College of Wooster uses the Microsoft Authenticator App to create that additional layer of security between your account information and cybercriminals. Accessing your account could give hackers access to student accounts, or College information at large. <\/p>\n\n\n\n<p>You can <a rel=\"noreferrer noopener\" href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/multi-factor-authentication\/\" target=\"_blank\">install the authenticator application<\/a> at anytime, and keep your information and College of Wooster community safe!<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security When people hear cyber security, they begin to think why, or something will never happen to my account or information. It is always someone else until it happens to you. Our entire lives are surround by potentially insecure technology and accounts from banking to ordering food. Passwords and PINs are easily compromised and [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[],"coauthors":[288],"class_list":["post-31378","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"gutentor_comment":0,"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":""},"post_excerpt_stackable":"<p>Cyber Security When people hear cyber security, they begin to think why, or something will never happen to my account or information. It is always someone else until it happens to you. Our entire lives are surround by potentially insecure technology and accounts from banking to ordering food. Passwords and PINs are easily compromised and with new technology are easy to &#8220;guess.&#8221; (Did you know the most commonly used passwords are 12345, qwerty, and password? If you fall into any of these 3 passwords for any account, go change your passwords!) Our goal as a community is not to make&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","author_info":{"name":"Samantha Mowrer","url":"https:\/\/inside.wooster.edu\/technology\/author\/smowrerwooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Samantha Mowrer","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/smowrerwooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"Cyber Security When people hear cyber security, they begin to think why, or something will never happen to my account or information. It is always someone else until it happens to you. Our entire lives are surround by potentially insecure technology and accounts from banking to ordering food. Passwords and PINs are easily compromised and&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/31378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=31378"}],"version-history":[{"count":7,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/31378\/revisions"}],"predecessor-version":[{"id":32051,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/31378\/revisions\/32051"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=31378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/categories?post=31378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/tags?post=31378"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=31378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}