Protecting data assets with two-factor authentication

February 3, 2016
Protecting data assets with two-factor authentication

To better protect the Institute's data – including employee data – from future cyber risks, the Office of Information Technology (OIT) will begin deploying two-factor authentication to early adopters across campus in 2016. The Office of Development and the Office of the President are among the first offices to adopt this technology department-wide. Offices in the Division of Administration and Finance are scheduled to follow this year. Here's what you need to know.

What is two-factor authentication?

Two-factor uses two pieces, or factors, of information to verify the identity of a user trying to access a service. The first factor, your password, has been deployed at Tech for many years. Other factors commonly used for identity include fingerprints, retina scans, numeric codes, and portable tokens. Using these two factors together gives a much stronger identity verification process than just a password alone.

Use of is quite common. In fact, you may already be familiar with two-factor authentication as it is often used in banking, cloud solutions such as Dropbox, email such as Gmail, or social/productivity sites such as Google+ or Facebook.

How does two-factor authentication work?

Two-factor authentication keeps information safe by requiring the user to enter a second layer of security, usually in the form of a generated number, before accessing a protected application. Because the second authentication is independent from your username and password, if your password is stolen, the web application using two-factor authentication is safe from attempted hackers.

What is Duo?

Georgia Tech has partnered with Duo Security to provide this service to our campus. Once a Georgia Tech IT support team has enabled two-factor authentication on your Georgia Tech account, in addition to using your usual username and to log in, you will need to authenticate your identity before accessing protected sites including TechWorks and Office365 as well as the (VPN) via Cisco.

When you log in to these protected systems, you will need access to your device(s) with the Duo app, or a telephone that you have configured for this purpose. Additional details regarding how to authenticate your will be provided once your system is enabled.

Explore further: Google vision of password rings heard at security event

Related Stories

Google vision of password rings heard at security event

March 13, 2013

(Phys.org) —Google finds much appeal in gaining the distinction of leading the way toward a future where USB sticks and rings can replace traditional passwords. The idea of killing off passwords has been an attractive one ...

Comfort is important in identification

December 10, 2015

VTT Technical Research Centre of Finland has conducted a study about user attitudes to different personal identification methods. The most popular identification methods were internet banking access codes and passwords. The ...

Recommended for you

How to build a 1,000mph car (by the scientists behind it)

July 22, 2016

It was a staggering feat, a car that went faster than the speed of sound. On October 15 1997, Andy Green travelled across the Black Rock Desert, Nevada, in the Thrust SSC at 763.035 mph, or Mach 1.02. Two decades on, that ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.