Protecting data assets with two-factor authentication

February 3, 2016, Georgia Institute of Technology
Protecting data assets with two-factor authentication

To better protect the Institute's data – including employee data – from future cyber risks, the Office of Information Technology (OIT) will begin deploying two-factor authentication to early adopters across campus in 2016. The Office of Development and the Office of the President are among the first offices to adopt this technology department-wide. Offices in the Division of Administration and Finance are scheduled to follow this year. Here's what you need to know.

What is two-factor authentication?

Two-factor uses two pieces, or factors, of information to verify the identity of a user trying to access a service. The first factor, your password, has been deployed at Tech for many years. Other factors commonly used for identity include fingerprints, retina scans, numeric codes, and portable tokens. Using these two factors together gives a much stronger identity verification process than just a password alone.

Use of is quite common. In fact, you may already be familiar with two-factor authentication as it is often used in banking, cloud solutions such as Dropbox, email such as Gmail, or social/productivity sites such as Google+ or Facebook.

How does two-factor authentication work?

Two-factor authentication keeps information safe by requiring the user to enter a second layer of security, usually in the form of a generated number, before accessing a protected application. Because the second authentication is independent from your username and password, if your password is stolen, the web application using two-factor authentication is safe from attempted hackers.

What is Duo?

Georgia Tech has partnered with Duo Security to provide this service to our campus. Once a Georgia Tech IT support team has enabled two-factor authentication on your Georgia Tech account, in addition to using your usual username and to log in, you will need to authenticate your identity before accessing protected sites including TechWorks and Office365 as well as the (VPN) via Cisco.

When you log in to these protected systems, you will need access to your device(s) with the Duo app, or a telephone that you have configured for this purpose. Additional details regarding how to authenticate your will be provided once your system is enabled.

Explore further: New Intel chip technology designed to foil hackers

Related Stories

Comfort is important in identification

December 10, 2015

VTT Technical Research Centre of Finland has conducted a study about user attitudes to different personal identification methods. The most popular identification methods were internet banking access codes and passwords. The ...

Ambient sound may help protect your online accounts

August 18, 2015

Two-factor authentication based on ambient sound has been the focus of four researchers from the Institute of Information Security ETH Zurich. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun posted ...

FIDO specs to pave way for post-password era

December 10, 2014

Dedicated to easier yet stronger authentication, the FIDO (Fast IDentity Online) Alliance announced Tuesday that it has published specifications, for broad industry adoption of strong authentication next year. The standards-delivering ...

Google vision of password rings heard at security event

March 13, 2013

( —Google finds much appeal in gaining the distinction of leading the way toward a future where USB sticks and rings can replace traditional passwords. The idea of killing off passwords has been an attractive one ...

Recommended for you

Engineering cellular function without living cells

March 25, 2019

Genes in living cells are activated – or not – by proteins called transcription factors. The mechanisms by which these proteins activate certain genes and deactivate others play a fundamental role in many biological processes. ...

What ionized the universe?

March 25, 2019

The sparsely distributed hot gas that exists in the space between galaxies, the intergalactic medium, is ionized. The question is, how? Astronomers know that once the early universe expanded and cooled enough, hydrogen (its ...

Catalyst advance removes pollutants at low temperatures

March 25, 2019

Researchers at Washington State University, University of New Mexico, Eindhoven University of Technology, and Pacific Northwest National Laboratory have developed a catalyst that can both withstand high temperatures and convert ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.