About Information Technology
Use Better Two-Factor Authentication
In August 2018, the world was surprised to discover Jack Dorsey’s Twitter account had been hacked.
The method by which he was hacked, however, had nothing to do with Twitter. It had everything to do with his phone number.
And using one small step would have prevented 20 minutes of embarrassment for a high-level executive at a Fortune 500 company.
The solution? Make your two-factor authentication depend on the physical phone and not just the phone number.
CSUMB Uses the Okta Verify App
You can also use an app for two-factor authentication when you login to csumb.edu. It's called Okta Verify.
Setting Up MFA on Popular Apps
See these how-to-guides on how to set up MFA on other popular apps:
Visit https://twofactorauth.org/ to see if they offer a “software token,” which is a time-based, one-time passcode.
Find out more from:
- Wired magazine’s article: How to Secure Your Accounts With Better Two-Factor Authentication.
- NPR's Morning Edition (10/25/2019): How Hijacked Cellphone Numbers Can Be Security Risks