Download presentation
Presentation is loading. Please wait.
1
Multifactor Authentication
Report From the Field
2
Why Multifactor? Passwords are not enough
User education about phishing and other social engineering attacks - not completely effective Consequences of breaches becoming more severe (fines, ID protection costs, reputation damage, legal and forensic costs) Multifactor is currently the most effective defense against compromised accounts
3
Multifactor Requirements
Secure Easy to use Platform agnostic Flexibility regarding second factor (not everyone has a smart phone) Administrative and support overhead can be managed with current staff
4
The Real Challenge How to sell multifactor to your institution…
Get buy-in from the top Know your selected product inside and out Have a communications plan and create opportunities to give presentations in front of as many campus groups as possible Be prepared with easy to use self-service documentation as well as knowledgeable phone support backup
5
Field Report: Medical University of South Carolina
Academic medical center 2,500 students and 10,000 faculty and staff Relentless phishing attacks were resulting in compromised accounts ( and VPN) Initial focus on increasing user awareness, and on early detection and containment Spring 2012: two-factor evaluation and feasibility testing
6
Strategy and Policy Summer 2012: Proposed new policies
Two-factor authentication required for remote access to sensitive systems Mobile device management Including BYOD devices if used to access institutional systems (including via ActiveSync) Policy vetting: Presidents Council, Deans, Faculty Senate, Medical Center leadership…
7
Oct 2012: SC Department of Revenue Breach
8
Leadership: Make It Happen
Draft policies and standards approved Vendor selection consummated Two-factor: PhoneFactor MDM: Zenprise Project teams organized Joint project communications
9
MUSC: 2 Factor Rollout Plan
April 2013: 250-person Pilot for IT Staff What we learned: more communications! August: Hire 5 interns/temp personnel Support/Enrollment Tables August-‐October: Massive Communications Push October 1: “Cut-‐off” date Post Go‐Live: Support Minimal
10
Communications 1000 Signs across campus Focus Groups Catalyst Article
Facebook Page MUSC Website Page Tech Fairs/ Student Fairs MDM/2FA Websites All Staff s Over 100 presentations to different on‐campus groups iPad Mini Giveaway
11
Posters & Banners
12
Help Tables
13
Newspaper Articles
14
Surveys & Focus Groups Surveys Focus Groups
Random survey to 10 students on campus: Do you know what Mobile Device Management is? 0 out of 10 knew what it was. Do you know what 2 Factor Authentication is? 1 our of 10 knew what it was. Focus Groups Non-‐Technical Users Started with 35 Page Instructions Ended with 1 Page Front and Back After Focus Groups
15
Email Campaign All-Staff Email Targeted Emails
From President of MUSC All-Staff s every week for 4 weeks Targeted s To Non-‐compliant users 5 per week for 4 weeks All Staff for Final Days Non‐compliance s: Auto-‐Generated
16
Presentations Over 100 Presentations Lots of push back at first
Individual Administrators Department Heads All-Staff Meetings Town Hall Meetings “VIP” One-‐on-‐one Sessions Lots of push back at first “This isn’t going to happen” “No way I’m doing this” “Why do we have to do this?” Use Compliance in these cases
17
Lessons Learned KNOW the products. Inside and Out
Have Focus Groups Before You Start Have examples Ready 2 Factor Demo Make sure they know, they can’t get out of this Train your Support Staff
18
Lessons Learned: Continued
Make sure you get approval at the top first. Plan on backlash. Prep Legal and Compliance and give them form s for responses. Be readily accessible through dedicated address, phone, etc. Get it done. Don’t put off deadline. Users will sign up if they have to.
19
Field Report: Northern Arizona University
26,000 students, 3,500 faculty and staff Previous two-factor limited to small number of sys admins and developers (using RSA fobs or software tokens) Direct Deposit attack fall of 2013 led to approval for broader multi-factor use Review of available products led to selection of DUO as multifactor solution
20
Progress Test instance of DUO up and running
VPN replacement project launched (switching from MS PPTP to Cisco AnyConnect) Project buy-in from President and Cabinet Information Security Committee selected as Stakeholder group representing all areas, students, faculty, and staff Currently defining levels of assurance (including vetting strategies for each level) and identifying which resources will be protected
21
Poster Child for Project Management
Push to establish a PMO within ITS – currently have two staff members Multifactor project one of our first projects to take advantage of the new PM structure Hoping to avoid mistakes of the past including communication problems and neglecting to get input from campus stakeholders
22
Hoped-for End Result
23
Let’s Hear from You Anyone Have Words of Wisdom from a Multifactor implementation to share? Questions/Comments?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.