{"id":58428,"date":"2022-10-24T14:55:00","date_gmt":"2022-10-24T18:55:00","guid":{"rendered":"https:\/\/www2.stetson.edu\/law\/docket\/?p=58428"},"modified":"2022-10-24T09:59:51","modified_gmt":"2022-10-24T13:59:51","slug":"security-awareness-mfa","status":"publish","type":"post","link":"https:\/\/www2.stetson.edu\/law\/docket\/security-awareness-mfa\/","title":{"rendered":"Security Awareness: MFA"},"content":{"rendered":"\n<p>Stetson currently utilizes Multifactor Authentication (MFA) to help protect a number of our internal and external systems. Utilizing a second form of authentication prevents unauthorized individuals from logging into our systems if your username and password are stolen or compromised. Unfortunately, in the world of cybersecurity no technology is perfect.<\/p>\n\n\n\n<p>Recently you may have heard in the news of an attack targeted at the rideshare company Uber. It was reported within this incident malicious individual(s) performed an MFA fatigue attack. <em>The attacker sends frequent MFA push requests to a user. It could involve frequent MFA requests in middle of the night or less frequent requests over a few days. An unknowing target receives on their phone a request to approve a login they have not performed<\/em>. By clicking approve the attacker now has access into the account. The user now has both factors of authentication. Push notifications are enabled through our Microsoft Authenticator app. We ask that you are continually cautious about approving requests. If you are not actively logging onto a system and have received an approval request don\u2019t approve it!<\/p>\n\n\n\n<p>Regards,<br>Information Technology Department<br><strong>STETSON UNIVERSITY College of Law<\/strong><br>1401 61st Street South | Gulfport, FL 33707<br><strong>Email:<\/strong> <a href=\"mailto:it@law.stetson.edu\">it@law.stetson.edu<\/a> | <strong>Office:<\/strong> +1 (727) 562 7323<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stetson currently utilizes Multifactor Authentication (MFA) to help protect a number of our internal and external systems. Utilizing a second form of authentication prevents unauthorized individuals from logging into our [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,10,8],"tags":[],"class_list":["post-58428","post","type-post","status-publish","format-standard","hentry","category-faculty","category-staff","category-students"],"_links":{"self":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/58428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/comments?post=58428"}],"version-history":[{"count":1,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/58428\/revisions"}],"predecessor-version":[{"id":58429,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/58428\/revisions\/58429"}],"wp:attachment":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/media?parent=58428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/categories?post=58428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/tags?post=58428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}