Skip to main content

Two-Factor Authentication

slideNumber:
a couple cuddles on a couch and watches a movie on their tablet

We'll be the first to tell you how important it is to have good, strong passwords . However, if an attacker manages to nab your password through brute-force hacking or phishing, there's one other defense you'll need to keep your accounts secure: two-factor authentication (or 2FA, as the cool kids call it). 2FA adds a second layer of protection by linking your account to something you own, like a mobile device, a dongle, or your fingerprint.

When you log in to a system that uses 2FA, you'll be prompted to use that "second factor"―whether it be a code sent to your phone, a push notification, or another system-specific action—to verify that it's really you. This second level of security makes it that much harder for a hacker to reach your account, while keeping the whole login process quick and easy for you. Like they say, "two authentication factors are better than one."

slideNumber:
a series of open laptops, demonstrating the process of signing in to BYU websites using Duo

All CES university accounts are guarded by a 2FA service called Duo. You'll be prompted by Duo to authenticate every time you log in to your university account. You can ask Duo to send you a passcode, give you a call, or buzz your phone with a push notification from the Duo Mobile app. Once you've self-authenticated, you can set Duo to only prompt you once every 30 days, saving even more time. Head on over to duo.byu.edu to start setting up Duo on your mobile devices.

LEARN MORE

Learn about the different kinds of malware that exist, and how to prevent, detect and respond to them.
Learn how to change your password, how to create a security question, and how to create passwords that protect your account.
Learn general tips for keeping your physical devices protected from unauthorized access and other physical threats.
Learn why keeping the operating system on your devices up to date is actually a very important security precaution.
Learn how to protect yourself from being scammed, tricked, or hacked while surfing the web.
Learn what steps you can take to ensure that your social media accounts are protected.
Learn how to identify and avoid scam emails, texts, and more. Phishing scams steal personal info on a regular basis.
Learn the difference between secured and unsecured Wi-Fi networks and how to be safe when connecting to a wireless network.
Learn about different data storage options and consider which options are best for your needs.
Learn about methods criminals might use to obtain your information by building false trust.
Learn how to be healthy and secure while following shelter-in-place instructions