{"id":220,"date":"2017-09-29T11:40:43","date_gmt":"2017-09-29T15:40:43","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=220"},"modified":"2017-10-06T10:13:49","modified_gmt":"2017-10-06T14:13:49","slug":"top-5-multi-factor-authentication-recommendations","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2017\/09\/29\/top-5-multi-factor-authentication-recommendations\/","title":{"rendered":"Top 5 Multi-Factor Authentication Recommendations"},"content":{"rendered":"<ol>\n<li><strong>Use the Duo Mobile App to Accept \u201cPush\u201d Notifications<br \/>\n<\/strong>For our employees that have a smartphone, download and install the Duo Mobile app from your device\u2019s application store (iTunes App Store, Google Play Store, Windows App Store) and search for \u201cDuo Mobile App\u201d. This is the most secure option and the most cost efficient for you and the University.\u00a0 If you need assistance, you can stop by any of the IT Service Desks at University Crossing, O\u2019Leary Library or Lydon Library.\u00a0 Refer to <a href=\"http:\/\/www.um.edu\/mfa\">www.uml.edu\/mfa<\/a> to manage your settings.<\/li>\n<li><strong>Make Sure Your Mobile Device Number is Your Primary MFA Device<br \/>\n<\/strong>You can change the order of your MFA devices by visiting <a href=\"http:\/\/www.uml.edu\/mfa\">www.uml.edu\/mfa<\/a><\/li>\n<li><strong> Take Advantage of the \u201cRemember me for 30 days\u201d Feature<br \/>\n<\/strong>When this box is checked, this means you are not challenged for a secondary authentication again when you log in to that application from that device for 30 days. Refer to <a href=\"http:\/\/www.uml.edu\/mfa\">www.uml.edu\/mfa<\/a> to manage this setting.<\/li>\n<li><strong>Register Multiple Devices<br \/>\n<\/strong>We strongly recommend registering at least two devices for MFA, such as your smart phone\/cell phone and your office\/home phone.\u00a0\u00a0\u00a0 Why?\u00a0 You may forget your primary device at home and you may need to get access to a protected application.\u00a0 Refer to <a href=\"http:\/\/www.uml.edu\/mfa\">uml.edu\/mfa<\/a> to manage your settings<\/li>\n<li><strong>Be Cautious<br \/>\n<\/strong>Try not to blindly accept a \u201cpush\u201d or request for a second authentication (sms code, phone call). If you receive a request, and it wasn\u2019t you who generated it, that means someone has your primary password to your account.\u00a0 Change your password immediately or contact the IT Service Desk (978-934-4357) for assistance.As always, you can check Out the Frequently Asked Questions Document for more useful information by visiting <a href=\"http:\/\/www.uml.edu\/mfa\">www.uml.edu\/mfa<\/a>\u00a0.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Use the Duo Mobile App to Accept \u201cPush\u201d Notifications For our employees that have a smartphone, download and install the Duo Mobile app from your device\u2019s application store (iTunes App Store, Google Play Store, Windows App Store) and search for &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2017\/09\/29\/top-5-multi-factor-authentication-recommendations\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/220"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=220"}],"version-history":[{"count":11,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/220\/revisions"}],"predecessor-version":[{"id":233,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/220\/revisions\/233"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}