IT News

By Bob Morrison

Straight out of a science fiction movie – retina scanning could be more commonly used as a security feature with the progression of Two-factor authentication.

Two-factor authentication (2F) adds a second level of authentication when logging into an account. A hacker can easily compromise Single factor authentication, since it requires only a username and password. 2F requires the user to authenticate their identity by using both a password and either 1) an object (such as a phone or a fob) or 2) a biological characteristic (such as a biometric fingerprint, voice print, or retina scan).

IPhone and Android devices are already using fingerprint, voice print, and facial recognition technology for 2F.

 

Using 2F is crucial to stay one step ahead of Internet hackers. In response to growing cyber threats and attacks, UW is currently using 2F for remote access to some of UW’s systems including the Self Service area to protect user’s Personally Identifiable Information. UW will be expanding 2F use in the future.

UW works with Duo Security to provide 2F. Duo Security supports a variety of second factor authentication methods including “one tap” approval on your smart phone, a call to your landline or cell phone, a fob, or codes received via SMS text messages. Learn how to enroll your device.

As always, UW is looking for ways to protect its network users and 2F is the future for Internet security.

 


Contents © 2017 by the University of Wyoming Division of Information Technology. All rights reserved. Content edited by Taylor Watson