• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • ATU Home
  • Announcements
  • Facebook
  • Instagram
  • Feedback
  • OIS A-Z
  • Working From Home

Office of Information Systems

Arkansas Tech University

  • Who We Are
    • Mission Statement
    • Our Staff
    • Our Divisions
      • Enterprise Resources Applications and Services
      • Information Security
      • Infrastructure Systems and Services
        • Infrastructure Services
        • Network Services
      • Technology Learning Resources
        • Instructional Technology Services
        • RPL Technology Center
        • Course Management Systems
          • BBLearn Blog
      • Support Services
    • Contact Us
  • What We Offer
    • Resource Summary
    • Computer Labs
    • Software
    • Policies
    • Hardware/Software Purchasing
    • Computer Based Training
    • Unified Communications
  • Solutions
  • Online Support
    • Service Catalog
    • Submit a Ticket
  • Manage Account

May 1, 2019 7:00am

2FA—Control in the Palm of Your Hand


by Sandy Silk

Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless to others? Were you tricked into revealing your password through a phishing scam? Rest easy, your account is safe! That’s essentially the control that two-factor authentication (2FA)—also known as two-step verification or login approval—gives to you. And, it only takes about two minutes to set up and two seconds to use. That’s a lot of power for very little effort!

  • How does it work? Once you’ve activated two-factor authentication on an account, whenever an account login with your password comes from a different device from what you’ve already permitted, an authorization check will come to your smartphone or another registered device. Without your approval or current code, a password thief can’t get into your account.
  • Is it difficult to set up? 2FA is becoming more widely available and easier to use. Typically, you’ll either install a mobile security app on your smartphone and use that to handle the authorization checks for accounts, or you could use the text/phone call method if you can’t install a mobile app. For international travelers, the mobile app also generates a code so that a data or cellular service connection isn’t required for this second step.
  • Can I adjust frequency of the checks? In many cases, yes, although some accounts may require the verification for specific transactions or functions. You may want to have the extra verification every time you log in (e.g., personal website administration), or you might be comfortable requesting the verification only when an access attempt comes from a computer/device other than the one you originally permitted when you set up 2FA—such as personal email account you typically only check from one laptop and one smartphone.
  • Which accounts should I protect with 2FA? Why wouldn’t you protect all of them where it’s available? But, start with those that are most critical to your identity and livelihood. Here are some suggestions:
    • Email accounts: “Forgot password” reset requests typically send instructions and links here, so protect this account to make sure you keep control of resetting your account passwords!
    • Financial accounts: Protect your money!
    • Social media accounts and website management accounts: Protect your brand!
    • Online shopping accounts: Protect usage of your stored credit card information!

Article by Chris Moss / Data Security Awareness, Security, Uncategorized

Footer

CAMPUS SUPPORT CENTER

RPL 150
(479) 968-0646 (call)
(479) 348-2436 (text)
campussupport@atu.edu

Hours of Operation - Spring 2025
Monday-Wednesday: 7am–10pm
Thursday-Friday: 7am-7pm
Saturday-Sunday: 2pm-6pm

 

Quick Links

  • Blackboard Learn
  • Dell Discounts
  • Equipment Removal
  • Feedback

Quick Links 2

  • InfoSec
  • Solutions
  • Manage Account

Quick Links 3

  • Office 365
  • OneTech
  • Online Training
  • Phishing

Quick Links 4

  • Policies
  • Purchasing
  • Security Awareness
  • Software Request
  • TeamViewer

ATU Logo

© Copyright 2020 Arkansas Tech University · All Rights Reserved · Website Accessibility