%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 24 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 22 0 R /I2 23 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250702142327+00'00') /ModDate (D:20250702142327+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6086 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 83.648 521.469 663.086 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 83.648 l 565.984 83.648 l 565.984 745.984 l f 45.266 746.734 m 45.266 83.648 l 46.016 83.648 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WHY IS MFA ESSENTIAL?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(authentication \(MFA\) is one.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven't, we )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(MFA authentication are the Microsoft365 applications. These include Outlook and Teams.)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(A guide on how to register is available at the bottom of this article and)] TJ ET 0.373 0.169 0.255 rg BT 361.589 553.486 Td /F1 9.0 Tf [(everything you need to know about MFA at )] TJ ET 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 361.589 552.056 m 547.619 552.056 l S 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 361.589 552.056 m 547.619 552.056 l S BT 61.016 542.497 Td /F1 9.0 Tf [(Stellenbosch University can be found on our service catalogue.)] TJ ET 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 61.016 541.067 m 332.600 541.067 l S 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 541.067 m 332.600 541.067 l S 0.153 0.153 0.153 rg BT 61.016 522.508 Td /F1 9.0 Tf [(WHAT IS MULTI-FACTOR AUTHENTICATION \(MFA\)?)] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(Multi-factor authentication \(MFA\) seeks to decrease the likelihood that others can access your data.)] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(Specifically, it enhances the security of yourUserIDby using your phone, tablet or other device to verify your identity when )] TJ ET BT 61.016 471.541 Td /F4 9.0 Tf [(you attempt to access Stellenbosch Universitys network and resources.)] TJ ET BT 61.016 451.552 Td /F4 9.0 Tf [(It takes two items to access and update your information: something you know \(e.g.your password\) and something you )] TJ ET BT 61.016 440.563 Td /F4 9.0 Tf [(have \(e.g.your phone\). For example, when you visit an ATM, one authentication factor is the ATM card you use to start )] TJ ET BT 61.016 429.574 Td /F4 9.0 Tf [(the transaction thats the something you have. Next, you enter a PIN, which is the something you know. Withoutboth )] TJ ET BT 61.016 418.585 Td /F4 9.0 Tf [(these factors, your authentication will fail.)] TJ ET BT 61.016 398.596 Td /F1 9.0 Tf [(WHY DO I NEED TO USE MFA?)] TJ ET BT 61.016 378.607 Td /F4 9.0 Tf [(Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology )] TJ ET BT 61.016 367.618 Td /F4 9.0 Tf [(and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means )] TJ ET BT 61.016 356.629 Td /F4 9.0 Tf [(information online is increasingly vulnerable. You might not even know who else has your password and is accessing your )] TJ ET BT 61.016 345.640 Td /F4 9.0 Tf [(accounts.)] TJ ET BT 61.016 325.651 Td /F4 9.0 Tf [(In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every )] TJ ET BT 61.016 314.662 Td /F4 9.0 Tf [(day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University's )] TJ ET BT 61.016 303.673 Td /F4 9.0 Tf [(financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now )] TJ ET BT 61.016 292.684 Td /F4 9.0 Tf [(has your login details and can access everything you can access - including, potentially, bank details. In this way HR )] TJ ET BT 61.016 281.695 Td /F4 9.0 Tf [(systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if )] TJ ET BT 61.016 270.706 Td /F4 9.0 Tf [(someone has usernames and passwords.)] TJ ET BT 61.016 250.717 Td /F4 9.0 Tf [(Wemusttake steps to ensure that we are more than just a single click away from having ourpay checkstolen or )] TJ ET BT 61.016 239.728 Td /F4 9.0 Tf [(becoming a victim of identity theft.)] TJ ET BT 61.016 219.739 Td /F4 9.0 Tf [(Multi-Factor Authentication adds a second layer of security to your account to ensurethat your account stays safe, even if )] TJ ET BT 61.016 208.750 Td /F4 9.0 Tf [(someone else knows your password. This second factor of authentication is separate and independent from theUserID)] TJ ET BT 61.016 197.761 Td /F4 9.0 Tf [(and password step MFA never uses or even sees your password.)] TJ ET BT 61.016 177.772 Td /F1 9.0 Tf [(HOW DO I REGISTER FOR MFA?)] TJ ET BT 61.016 157.783 Td /F4 9.0 Tf [(You can register for MFA by )] TJ ET 0.373 0.169 0.255 rg BT 175.559 157.783 Td /F4 9.0 Tf [(following the steps in this guide.)] TJ ET 0.18 w 0 J [ ] 0 d 175.559 156.632 m 302.621 156.632 l S 0.153 0.153 0.153 rg BT 61.016 134.824 Td /F1 9.0 Tf [(Read more on MFA:)] TJ ET 0.373 0.169 0.255 rg BT 61.016 114.835 Td /F4 9.0 Tf [(MFA FAQ's)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 113.684 m 107.240 113.684 l S q 139.500 0 0 138.750 61.016 372.560 cm /I2 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 361.5887 552.6532 547.6187 561.8107 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www0.sun.ac.za/itservices/useradm/mfa.htm) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 541.6642 332.5997 550.8217 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://www0.sun.ac.za/itservices/useradm/mfa.htm) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 372.5599 200.5157 511.3099 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2020/05/mfa.png) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 175.5587 156.9502 302.6207 166.1077 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/MFA_guide.pdf) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 114.0022 107.2397 123.1597 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/08/multi-factor-authentication-mfa-faqs/) >> endobj 22 0 obj << /Type /XObject /Subtype /Image /Width 186 /Height 185 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 186 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 204>> stream xA 01> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 5465>> stream x}pǿwɖ'VBd'vpZ M%MR􀃴ޤ ܻw 3C c̹G<2MJ ib88!cM-۲-Y/vC1J+-W7qJ@GKݻz@b D9+Nq9\Z*Z.U5 FqR0F.+6ڱ|Kt/@/-)Tˊ#;ܷ6춋d |{Y]]bSk2Dtk]љOk|lFw;CQdko3#Ltt>&[=3tJGGd1Hg6|b`槙mu$S }HG.:uёt]t$#] H@EG.:ojw)`Jօ'` "0+_,bsŒ2M] |U U.I6-1V| EN ,%`S !J %7)$]Xɶm}Z2#Y 2u #W>[:C{>,M䒲E"ImŻ)_Rj'$sdlű0 yiȳO$ x ].1fI|u&Ӵ.yE¦%Q=WKO<{#gfS]xVho87ϹO^p{1X|~k$ ?ZwܹnCcN$1_H"l)j.DUJYim~j{l^5eHVp-5}"ZK{p-+cE$پrI]b<-yS+.}]XaKC[;R0Ӡ3bEKqf[JPSoj}tIv95y(|+d#zg&sXP4.g&7eyZh/o|_acA=k`(8o6=(jI ʮ/D]yadjagx'S3,4ux" B{"=Y օhO#-iDH@+Eu19r+؝ɮFda@ Oz3<.D Յh$׺e 0IpޅFHI@r"K @fD(+)C}mܲ>dQQGt *M$ANOLAT@ G 7_sNӥ eacM*Ѕ0ʏ>:6= b7 4SXe|Xpۯ{夀3UUAّF_8eyii/5nT7;˜̂\BB8;lf9=cz} tFIF7uRs py9%U Ce{0^`dq%'S`$AMSrjt1RQһl}Rgg*s \F]Űf,B}#.<嵢4.OY_`Dt@ࠛNx6kS}jkQOc }%rMG N` vAZH=RahJucn/͂l.> )mNT T6/<ݶt7 #1 NFA5>pD=cP.llTl{09Ug5F%h@veSdрZGݺ='.z@E8q)ҸP./>)r>uv3Q{P0Q?_rd4M'?z#lͯ  XҀ"+o"f] IJC~~tI&Zf]]m?(ppCcȮ~A33#cJCǾydT9є. z5l|UhhJ)]071w듳"?nFT$ 3G.yОcڪhP6#.BA#A 5o3dexp '\?tx.Y>fu` Ⱦ${t[ܜhY^|&>#je]0T>>H}F "ΏuPIţTcG/L W؎ǿ܆O{DU>E?E1|;lDr ݞh^>+ᶱ'/ WM/ ڐqpn?ΑoqvǧS?lQ+BwT-yz#O!Uyo~ 8G^=X\xǮdR/ L]z۰Xy^eR0^W~ط.G}Vce~ \w'[߽\loٖ7Bi~v0"*`?+:OP݋~0_.;M‹.iM//taSO%R^CaGixHnR3`#ZG$0k~fb..$Ns c Η^]bB1ctYqd{ó ӽM>=.A~YC4uMC@zM!ؼ~h9/. #t\ ϸu.s~_ٶ|B3ґٜp endstream endobj 24 0 obj << /Type /Page /Parent 3 0 R /Annots [ 26 0 R 28 0 R 30 0 R ] /Contents 25 0 R >> endobj 25 0 obj << /Length 1120 >> stream 0.373 0.169 0.255 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 651.778 521.469 106.206 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 651.778 m 566.734 651.778 l 565.984 652.528 l 46.016 652.528 l f 566.734 757.984 m 566.734 651.778 l 565.984 652.528 l 565.984 757.984 l f 45.266 757.984 m 45.266 651.778 l 46.016 652.528 l 46.016 757.984 l f 61.016 667.528 m 550.984 667.528 l 550.984 668.278 l 61.016 668.278 l f 0.373 0.169 0.255 rg BT 61.016 740.193 Td /F4 9.0 Tf [(Back to basics: Multi-factor authentication \(MFA\))] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 739.042 m 254.579 739.042 l S BT 61.016 720.204 Td /F4 9.0 Tf [(What is Multi-factor authentication? And why is it important?)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 719.053 m 299.606 719.053 l S BT 61.016 700.215 Td /F4 9.0 Tf [(Video on MFA by tech expert Tom Scott.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 699.064 m 223.088 699.064 l S 0.400 0.400 0.400 rg BT 61.016 681.726 Td /F2 9.0 Tf [(Posted in:News,Notices,Security | | With 0 comments)] TJ ET endstream endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 739.3606 254.5787 748.5181 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (https://www.nist.gov/itl/applied-cybersecurity/tig/back-basics-multi-factor-authentication) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 719.3716 299.6057 728.5291 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (https://www.tools4ever.com/glossary/what-is-multi-factor-authentication/) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 699.3826 223.0877 708.5401 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (https://www.youtube.com/watch?v=hGRii5f_uSc) >> endobj xref 0 32 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000350 00000 n 0000000387 00000 n 0000000525 00000 n 0000000635 00000 n 0000006773 00000 n 0000006885 00000 n 0000007000 00000 n 0000007120 00000 n 0000007228 00000 n 0000007356 00000 n 0000007457 00000 n 0000007584 00000 n 0000007685 00000 n 0000007812 00000 n 0000007911 00000 n 0000008039 00000 n 0000008145 00000 n 0000008272 00000 n 0000008399 00000 n 0000008848 00000 n 0000014572 00000 n 0000014670 00000 n 0000015843 00000 n 0000015970 00000 n 0000016112 00000 n 0000016239 00000 n 0000016363 00000 n 0000016490 00000 n trailer << /Size 32 /Root 1 0 R /Info 5 0 R >> startxref 16585 %%EOF Why is MFA essential? « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Why is MFA essential?

Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor authentication (MFA) is one. 

Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven’t, we ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need MFA authentication are the Microsoft365 applications. These include Outlook and Teams.

A guide on how to register is available at the bottom of this article and everything you need to know about MFA at Stellenbosch University can be found on our service catalogue.

WHAT IS MULTI-FACTOR AUTHENTICATION (MFA)?

Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data.  

Specifically, it enhances the security of your UserID by using your phone, tablet or other device to verify your identity when you attempt to access Stellenbosch University’s network and resources.  

It takes two items to access and update your information: “something you know” (e.g. your password) and “something you have” (e.g. your phone). For example, when you visit an ATM, one authentication factor is the ATM card you use to start the transaction – that’s the “something you have.” Next, you enter a PIN, which is the “something you know.” Without both these factors, your authentication will fail.  

WHY DO I NEED TO USE MFA?  

Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means information online is increasingly vulnerable. You might not even know who else has your password and is accessing your accounts.  

In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University’s financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now has your login details and can access everything you can access – including, potentially, bank details. In this way HR systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if someone has usernames and passwords. 

We must take steps to ensure that we are more than just a single click away from having our pay check stolen or becoming a victim of identity theft.  

Multi-Factor Authentication adds a second layer of security to your account to ensure that your account stays safe, even if someone else knows your password. This second factor of authentication is separate and independent from the UserID and password step — MFA never uses or even sees your password. 

HOW DO I REGISTER FOR MFA?

You can register for MFA by following the steps in this guide.

Read more on MFA: 

MFA FAQ’s

Back to basics: Multi-factor authentication (MFA)

What is Multi-factor authentication? And why is it important?

Video on MFA by tech expert Tom Scott.

Comments are closed.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.