Two-Step Verification

Slides:



Advertisements
Similar presentations
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Advertisements

Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Mrs. Jefferson Business Information Management I.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Computer crimes.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Cyber Crime in the Real Estate Industry
ArchPass Duo Presentation
IT Security Awareness Day October 19, 2016
Multifactor Authentication
Louisiana State University
CYBER SECURITY PANDEMIC
Direct Deposit Phishing Attack
CIO Council: IAM Update
Do you know who your employees are sharing their credentials with
Password Escrow Service
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Network Neighborhood? Who’s on Your Wi-Fi?
Security in the Workplace: Information Assurance
Cyber Security Awareness Workshop
Two-Step Verification Deployment Project Update
Multifactor Authentication
How to Protect Yourself from ID Theft and Social Engineering
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Presented by: Brendan Walsh Manager, Security and Access Management
CIO Council Identity and Access Management
Passwords.
CIO Council Update: HarvardKey
Cybersecurity Awareness
Information Security Awareness 101
Risk of the Internet At Home
Technology Services Multi-Factor Authentication gsw
Scams and Schemes.
Multifactor Authentication & First Time Login
Duo Deployment Project: Update and Communications
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Chapter 1: The Need for Cybersecurity
Information Systems for Health:
Faculty of Science IT Department By Raz Dara MA.
Protecting Your Company’s Most Valuable Asset
Protecting your data with Azure AD
Presented by Elizabeth Kunkel Member Service Trainer
LO1 - Know about aspects of cyber security
Information Security – Sep 18
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Information Protection
Security in mobile technologies
Multi-Factor Authentication at SUNY
Session 1 – Introduction to Information Security
Information Protection
Employee Self-Service (ESS) Portal
Presentation transcript:

Two-Step Verification Presenter DATE

What is Two-Step Verification? A simple and very effective security feature used with HarvardKey to help protect your Harvard account even if your password is stolen Designed to make it more difficult for an impersonator to use Harvard credentials to access our systems Uses a second device, commonly a mobile phone, to verify your identity 1 Login to HarvardKey 2 Verify with Duo Help Keep Cyber Criminals Out

Why Require Two-step Verification? 11/14/2018 Why Require Two-step Verification? Harvard is a high priority target for hackers, including nation-states Stolen Harvard credentials are used to gain unauthorized access to systems This step will greatly enhance our information security, and help to protect, for example: SSN and direct deposit information research data and intellectual property faculty, staff, and student personal information Even if you don’t have direct access to sensitive information beyond your personal data, a cybercriminal who steals your account can leverage it to access additional Harvard information and systems. Harvard is a high priority target for hackers, including foreign nation state-sponsored entities who attempt to access University systems with ever-increasing sophistication and frequency. Two-step authentication is designed to provide an extra level of security, and to make it more difficult for an impersonator to use Harvard credentials to access our systems. This step will greatly enhance our information security, and help to protect direct deposit information, research data, and intellectual property, as well as faculty, staff, and student personal information. Your personal data like direct deposit account number and your Social Security Number. If a cybercriminal reaches this information, they can divert your paycheck or open new accounts in your name.   Your University data like sensitive research and administration information. The theft of this kind of information can result in lost grants, harm to critical research initiatives, and the exposure of private information about Harvard and its community. Other people's data at Harvard. Although you may not have direct access to sensitive information beyond your personal data, a cybercriminal who steals your account can leverage it to access additional accounts and systems that hold other people's information at Harvard. At Harvard, we detect almost 500 compromised accounts every month that are actively being abused/used to access Harvard resources – two-step verification will drastically reduce this number

When Will This Be Required? huit.harvard.edu/twostep/schedule for most up to date Population Required by… Users of HUIT VPN service September 28 Harvard Graduate School of Design Central Administration, Inter-faculty Initiatives, Allied Institutions October 5 Radcliffe Institute for Advanced Study October 12 Harvard Divinity School Harvard Division of Continuing Education (faculty/staff only) Faculty of Arts and Sciences, Paulson SEAS October 19 T.H. Chan School of Public Health November 1 Harvard Medical School (quad only) Graduate School of Education November 17 Harvard Business School, Harvard Business Publishing Harvard Kennedy School Harvard Law School

More information and step-by-step instructions: Questions/Concerns More information and step-by-step instructions: http://huit.harvard.edu/twostep