%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 21 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R /I2 19 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20220127053753+00'00') /ModDate (D:20220127053753+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 5679 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 70.228 521.469 676.506 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 70.228 l 565.984 70.228 l 565.984 745.984 l f 45.266 746.734 m 45.266 70.228 l 46.016 70.228 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(WHY IS MFA ESSENTIAL?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(authentication \(MFA\) is one.)] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven't, we )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(MFA authentication are the Microsoft365 applications. These include Outlook and Teams.)] TJ ET BT 61.016 480.099 Td /F4 9.0 Tf [(A guide on how to register is available at the bottom of this article and)] TJ ET 0.373 0.169 0.255 rg BT 361.589 480.099 Td /F4 9.0 Tf [(everything you need to know about MFA at )] TJ ET 0.400 0.400 0.400 RG 0.18 w 0 J [ ] 0 d 361.589 478.670 m 547.619 478.670 l S 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 361.589 478.670 m 547.619 478.670 l S BT 61.016 469.110 Td /F4 9.0 Tf [(Stellenbosch University can be found on our service catalogue.)] TJ ET 0.400 0.400 0.400 RG 0.18 w 0 J [ ] 0 d 61.016 467.681 m 332.600 467.681 l S 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 467.681 m 332.600 467.681 l S 0.400 0.400 0.400 rg BT 61.016 449.121 Td /F4 9.0 Tf [(WHAT IS MULTI-FACTOR AUTHENTICATION \(MFA\)?)] TJ ET BT 61.016 429.132 Td /F3 9.0 Tf [(Multi-factor authentication \(MFA\) seeks to decrease the likelihood that others can access your data.)] TJ ET BT 61.016 409.143 Td /F3 9.0 Tf [(Specifically, it enhances the security of yourUserIDby using your phone, tablet or other device to verify your identity when )] TJ ET BT 61.016 398.154 Td /F3 9.0 Tf [(you attempt to access Stellenbosch Universitys network and resources.)] TJ ET BT 61.016 378.165 Td /F3 9.0 Tf [(It takes two items to access and update your information: something you know \(e.g.your password\) and something you )] TJ ET BT 61.016 367.176 Td /F3 9.0 Tf [(have \(e.g.your phone\). For example, when you visit an ATM, one authentication factor is the ATM card you use to start )] TJ ET BT 61.016 356.187 Td /F3 9.0 Tf [(the transaction thats the something you have. Next, you enter a PIN, which is the something you know. Withoutboth )] TJ ET BT 61.016 345.198 Td /F3 9.0 Tf [(these factors, your authentication will fail.)] TJ ET BT 61.016 325.209 Td /F4 9.0 Tf [(WHY DO I NEED TO USE MFA?)] TJ ET BT 61.016 305.220 Td /F3 9.0 Tf [(Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology )] TJ ET BT 61.016 294.231 Td /F3 9.0 Tf [(and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means )] TJ ET BT 61.016 283.242 Td /F3 9.0 Tf [(information online is increasingly vulnerable. You might not even know who else has your password and is accessing your )] TJ ET BT 61.016 272.253 Td /F3 9.0 Tf [(accounts.)] TJ ET BT 61.016 252.264 Td /F3 9.0 Tf [(In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every )] TJ ET BT 61.016 241.275 Td /F3 9.0 Tf [(day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University's )] TJ ET BT 61.016 230.286 Td /F3 9.0 Tf [(financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now )] TJ ET BT 61.016 219.297 Td /F3 9.0 Tf [(has your login details and can access everything you can access - including, potentially, bank details. In this way HR )] TJ ET BT 61.016 208.308 Td /F3 9.0 Tf [(systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if )] TJ ET BT 61.016 197.319 Td /F3 9.0 Tf [(someone has usernames and passwords.)] TJ ET BT 61.016 177.330 Td /F3 9.0 Tf [(Wemusttake steps to ensure that we are more than just a single click away from having ourpay checkstolen or )] TJ ET BT 61.016 166.341 Td /F3 9.0 Tf [(becoming a victim of identity theft.)] TJ ET BT 61.016 146.352 Td /F3 9.0 Tf [(Multi-Factor Authentication adds a second layer of security to your account to ensurethat your account stays safe, even if )] TJ ET BT 61.016 135.363 Td /F3 9.0 Tf [(someone else knows your password. This second factor of authentication is separate and independent from theUserID)] TJ ET BT 61.016 124.374 Td /F3 9.0 Tf [(and password step MFA never uses or even sees your password.)] TJ ET BT 61.016 104.385 Td /F4 9.0 Tf [(HOW DO I REGISTER FOR MFA?)] TJ ET q 139.500 0 0 138.750 61.016 299.173 cm /I2 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 361.5887 479.2666 547.6187 488.4241 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www0.sun.ac.za/itservices/useradm/mfa.htm) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 468.2776 332.5997 477.4351 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://www0.sun.ac.za/itservices/useradm/mfa.htm) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 299.1733 200.5157 437.9233 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2020/05/mfa.png) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 186 /Height 185 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 186 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 204>> stream xA 01> /ColorSpace [ /Indexed /DeviceRGB 60 20 0 R ] /BitsPerComponent 8 /Length 2168>> stream xy{:5GźTZUj{=\ aPs4/!Lh*S͋j]^4ɯZvdj[W Vn]W<^%{W/~9H&@-CD5zP^j2Tѱ7.IvozESGe; DZ0jԣjȺŠTԴOD]˫ElLYQNwlDMm ѱ?ia(6)]%UiSw%o4VvUF7g|5ʛIEFc;fFj_k'5ˢ7f rFpo ,&>v3ˍpՒxs;0 kk vAޥ$z ?"BtCx7,)DNwYz_bjA:Nb4-vݮ_m2ů.A@? Ǧzj `{8DL<Ȏ-{n.&'چf{1׳[*tltHpw!lYt8OǸ5lvRہs4>:H/:7M~r&wBjilatt8"=2E[2;T@~4Ϳ6$}}&D}_V1U~/zQF aWB:g7_4IuL\=gEGQj֢76U# /Kw2&#C\\/EGd_eTL> I ;d[ &nT=lwxm;ЭEFEUuȇFXyi`R XQMd RShDJlsx#1 H]Bmԇ3%I9)+Uü`lrT zs 3+ LŠs$޺(\QQ衝?Z9YĈCGX#*CJ[dOSEF/C5zP^j2^OV q?\OnWCU|OVvq巷4 aOmY endstream endobj 20 0 obj << /Length 183 >> stream mAxR{uqnmasP݀固[p6ۛn߭]`u"}gjJiԒۏ:uYi߮H}PD7w endstream endobj 21 0 obj << /Type /Page /Parent 3 0 R /Annots [ 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R ] /Contents 22 0 R >> endobj 22 0 obj << /Length 1491 >> stream 0.400 0.400 0.400 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 600.841 521.469 157.143 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 600.841 m 566.734 600.841 l 565.984 601.591 l 46.016 601.591 l f 566.734 757.984 m 566.734 600.841 l 565.984 601.591 l 565.984 757.984 l f 45.266 757.984 m 45.266 600.841 l 46.016 601.591 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 740.193 Td /F3 9.0 Tf [(You can register for MFA by )] TJ ET 0.373 0.169 0.255 rg BT 175.559 740.193 Td /F3 9.0 Tf [(following the steps in this guide.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 175.559 739.042 m 302.621 739.042 l S 0.400 0.400 0.400 rg BT 61.016 717.234 Td /F4 9.0 Tf [(Read more on MFA:)] TJ ET 0.373 0.169 0.255 rg BT 61.016 697.245 Td /F3 9.0 Tf [(MFA FAQ's)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 696.094 m 107.240 696.094 l S BT 61.016 677.256 Td /F3 9.0 Tf [(Back to basics: Multi-factor authentication \(MFA\))] TJ ET 0.18 w 0 J [ ] 0 d 61.016 676.105 m 254.579 676.105 l S BT 61.016 657.267 Td /F3 9.0 Tf [(What is Multi-factor authentication? And why is it important?)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 656.116 m 299.606 656.116 l S BT 61.016 637.278 Td /F3 9.0 Tf [(Video on MFA by tech expert Tom Scott.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 636.127 m 223.088 636.127 l S 0.400 0.400 0.400 rg BT 61.016 618.789 Td /F3 9.0 Tf [(Posted in:News,Notices,Security | | With 0 comments)] TJ ET endstream endobj 23 0 obj << /Type /Annot /Subtype /Link /A 24 0 R /Border [0 0 0] /H /I /Rect [ 175.5587 739.3606 302.6207 748.5181 ] >> endobj 24 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/MFA_guide.pdf) >> endobj 25 0 obj << /Type /Annot /Subtype /Link /A 26 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 696.4126 107.2397 705.5701 ] >> endobj 26 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/08/multi-factor-authentication-mfa-faqs/) >> endobj 27 0 obj << /Type /Annot /Subtype /Link /A 28 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 676.4236 254.5787 685.5811 ] >> endobj 28 0 obj << /Type /Action /S /URI /URI (https://www.nist.gov/itl/applied-cybersecurity/tig/back-basics-multi-factor-authentication) >> endobj 29 0 obj << /Type /Annot /Subtype /Link /A 30 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 656.4346 299.6057 665.5921 ] >> endobj 30 0 obj << /Type /Action /S /URI /URI (https://www.tools4ever.com/glossary/what-is-multi-factor-authentication/) >> endobj 31 0 obj << /Type /Annot /Subtype /Link /A 32 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 636.4456 223.0877 645.6031 ] >> endobj 32 0 obj << /Type /Action /S /URI /URI (https://www.youtube.com/watch?v=hGRii5f_uSc) >> endobj xref 0 33 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000350 00000 n 0000000387 00000 n 0000000522 00000 n 0000000618 00000 n 0000006349 00000 n 0000006461 00000 n 0000006568 00000 n 0000006684 00000 n 0000006804 00000 n 0000006932 00000 n 0000007033 00000 n 0000007160 00000 n 0000007261 00000 n 0000007388 00000 n 0000007487 00000 n 0000007936 00000 n 0000010387 00000 n 0000010622 00000 n 0000010734 00000 n 0000012278 00000 n 0000012406 00000 n 0000012512 00000 n 0000012639 00000 n 0000012766 00000 n 0000012893 00000 n 0000013035 00000 n 0000013162 00000 n 0000013286 00000 n 0000013413 00000 n trailer << /Size 33 /Root 1 0 R /Info 5 0 R >> startxref 13508 %%EOF Why is MFA essential? « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Why is MFA essential?

Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor authentication (MFA) is one. 

Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven’t, we ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need MFA authentication are the Microsoft365 applications. These include Outlook and Teams.

A guide on how to register is available at the bottom of this article and everything you need to know about MFA at Stellenbosch University can be found on our service catalogue.

WHAT IS MULTI-FACTOR AUTHENTICATION (MFA)?

Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data.  

Specifically, it enhances the security of your UserID by using your phone, tablet or other device to verify your identity when you attempt to access Stellenbosch University’s network and resources.  

It takes two items to access and update your information: “something you know” (e.g. your password) and “something you have” (e.g. your phone). For example, when you visit an ATM, one authentication factor is the ATM card you use to start the transaction – that’s the “something you have.” Next, you enter a PIN, which is the “something you know.” Without both these factors, your authentication will fail.  

WHY DO I NEED TO USE MFA?  

Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means information online is increasingly vulnerable. You might not even know who else has your password and is accessing your accounts.  

In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University’s financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now has your login details and can access everything you can access – including, potentially, bank details. In this way HR systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if someone has usernames and passwords. 

We must take steps to ensure that we are more than just a single click away from having our pay check stolen or becoming a victim of identity theft.  

Multi-Factor Authentication adds a second layer of security to your account to ensure that your account stays safe, even if someone else knows your password. This second factor of authentication is separate and independent from the UserID and password step — MFA never uses or even sees your password. 

HOW DO I REGISTER FOR MFA?

You can register for MFA by following the steps in this guide.

Read more on MFA: 

MFA FAQ’s

Back to basics: Multi-factor authentication (MFA)

What is Multi-factor authentication? And why is it important?

Video on MFA by tech expert Tom Scott.

Comments are closed.

 

© 2013-2022 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.