{"id":78,"date":"2015-10-22T14:19:13","date_gmt":"2015-10-22T18:19:13","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=78"},"modified":"2015-10-22T15:18:20","modified_gmt":"2015-10-22T19:18:20","slug":"protecting-your-digital-life-2-steps-ahead","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/22\/protecting-your-digital-life-2-steps-ahead\/","title":{"rendered":"Protecting Your Digital Life &#8211; 2 Steps Ahead"},"content":{"rendered":"<p id=\"eow-description\">Using a password alone to secure your data on online accounts is the first step toward protecting yourself. Learn how to take the second step and add an extra layer of security and take control of your online accounts with 2 step authentication. Get more at www.stopthinkconnect.org\/2stepsahead.<\/p>\n<p><iframe loading=\"lazy\" width=\"584\" height=\"329\" src=\"https:\/\/www.youtube.com\/embed\/vC8qbff_U4o?feature=oembed\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p><em>This video is courtesy of the Stop.Think.Connect campaign as part of the National Cyber Security Awareness Month<\/em>.<\/p>\n<p>Two-step, multi-factor authentication or 2FA is a security tool that uses multiple verification techniques to prove that the person attempting to log onto an account is really that person.<\/p>\n<p>One method with which many of us are already familiar is that special code we receive via phone text after we\u2019ve logged onto a password-protected site or app on our laptop or other device from a browser we normally don\u2019t use. We gain access to our account only after we correctly enter the code.\u00a0 Banks have been doing this for years to protect your information.<\/p>\n<p><strong>Two-factor authentication can combine multiple types of verification.<\/strong><\/p>\n<p>Some of these methods include:<\/p>\n<ul>\n<li>Something you know:\u00a0a password, code, passphrase or PIN<\/li>\n<li>Something you have: a physical token, chip,\u00a0 or phone<\/li>\n<\/ul>\n<p>These methods provide an extra layer of security. Most people only have one layer \u2013 their password \u2013 to protect their account. But combining something you know (your password) with something you have (your phone, token, etc.), makes your account even more secure.<\/p>\n<p>In just one example of its use, Information Technology has enabled two-factor authentication for\u00a0system administrators\u00a0accessing UML resources from off-campus locations via our Virtual Private Network (VPN).\u00a0 Stay tuned for more 2FA announcements accessing other applications like HR Direct and SIS.<\/p>\n<p>Big sites already using two-factor authentication include Facebook, Twitter, Dropbox, Gmail, PayPal, eBay, and Amazon Web Services.<\/p>\n<p><a href=\"https:\/\/www.turnon2fa.com\/\" target=\"_blank\"><u><span style=\"color: #0066cc\">Turn It On: See step-by-step instructions on how to add two-factor authentication to more than 100 online accounts<\/span><\/u><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using a password alone to secure your data on online accounts is the first step toward protecting yourself. Learn how to take the second step and add an extra layer of security and take control of your online accounts with &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/22\/protecting-your-digital-life-2-steps-ahead\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/78"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=78"}],"version-history":[{"count":4,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/78\/revisions"}],"predecessor-version":[{"id":85,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/78\/revisions\/85"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=78"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=78"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}