[OPLIN 4cast] OPLIN 4Cast #609: Passwords are not enough. The time for 2FA is now
OPLIN Support
support at oplin.ohio.gov
Wed Aug 29 10:30:06 EDT 2018
Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
[image: OPLIN 4Cast]
OPLIN 4Cast #609: Passwords are not enough. The time for 2FA is now
August 29th, 2018
[image: 2FA Two-factor authentication] A couple of months ago, I got an
online subscription to *WIRED* magazine. As a thank-you gift, I was sent a
YubiKey. When I received it, I really had no idea what it was: it looked
much like a flattened USB drive. When I realized that it was a form of
hardware two-factor authentication (2FA), I happily proceeded to set up and
configure my account. I even ordered myself another one, as a spare I can
carry around.
I'm a huge fan of 2FA. It's turned on for pretty much everything I can do
online, where it has been possible to do so. If you're reading this, and
you haven't done this...well, this is one of those things for which you'll
kick yourself later. Two-factor authentication simply means that, beyond
providing login credentials (like a username and password), there's a
second step required to log into a site or service. Ideally, this second
step is providing a code from an app like Google Authenticator
<https://mashable.com/2017/10/29/how-to-set-up-google-authenticator/#JXQzDxglVqqZ>
or activating a hardware 2FA key like my Yubikey. Some online services
still use a SMS message as a second step (I'm looking at *you, *Paypal!),
which is not really a good idea, as you'll see below. You don't have to
buy a Yubikey. Keep in mind that you may have to do a little googling to
find out how to set 2FA up for each site or service.
-
- Password breach teaches Reddit that, yes, phone-based 2FA is that bad
<https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/>
[Ars Technica] "A newly disclosed breach that stole password data and
private messages is teaching Reddit officials a lesson that security
professionals have known for years: two-factor authentication (2FA) that
uses SMS or phone calls is only slightly better than no 2FA at all."
- Even many tech-savvy people not using two-factor authentication, finds
university <https://9to5mac.com/2018/08/09/2fa-adoption/> [9to5Mac]
"What they found was that while these students understood technology, they
didn’t understand why they needed to take this cybersecurity precaution.
'There was a tremendous sense of confidence,' Camp said. 'We got a lot of,
‘My password is great. My password is plenty long enough.''
- Fortnite motivates players to turn on 2FA with a funky new emote
<https://thenextweb.com/gaming/2018/08/24/fortnite-2fa-funky-emote/>
[The Next Web] "The *Fortnite* team today announced it’d be offering a
“Boogie Down” emote to those of its consumers who enabled two-factor
authentication on their accounts. This creative way of incentivizing
security might help motivate some younger fans who don’t yet fully
understand how to protect themselves online."
- Instagram hacks raise questions about its 2FA security
<https://mashable.com/2018/08/22/instagram-hacks-raise-questions-about-2fa-security/#n2MpltSD7aqd>
[Mashable] "Instagram lets users secure their accounts with two-factor
authentication, but it currently relies on text messages, which aren't as
secure as app-based authentication methods."
*From the Ohio Web Library <http://ohioweblibrary.org>:*
- Two-Factor Authentication: Who Has It and How to Set It Up
<http://proxy.oplin.org:2054/login.aspx?direct=true&db=buh&AN=128120315&site=ehost-live>
(GRIFFITH, E. (2018). Two-Factor Authentication: Who Has It and How to Set
It Up. *PC Magazine*, 115-123. )
- Multi-Factor Authentication—It's Not Just Buying Another Lock
<http://proxy.oplin.org:2054/login.aspx?direct=true&db=cmh&AN=99233743>
(west, j. (2014). Multi-Factor Authentication—It's Not Just Buying Another
Lock. Computers In Libraries, 34(9), 26-27.)
- WHAT TO DO AFTER A DATA BREACH: 5 STEPS TO MINIMIZE RISK
<http://proxy.oplin.org:2054/login.aspx?direct=true&db=cph&AN=129861039&site=ehost-live>
(PAUL, I. (2018). WHAT TO DO AFTER A DATA BREACH: 5 STEPS TO MINIMIZE RISK.
Pcworld, 36(6), 84-89. )
------------------------------
The *OPLIN 4cast* is a weekly compilation of recent headlines, topics, and
trends that could impact public libraries. You can subscribe to it in a
variety of ways, such as:
- *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
subscribing to the following URL: http://www.oplin.org/4cast/ind
ex.php/?feed=rss2.
- *Live Bookmark.* If you're using the Firefox web browser, you can go
to the 4cast website (http://www.oplin.org/4cast/) and click on the
orange "radio wave" icon on the right side of the address bar. In Internet
Explorer 7, click on the same icon to view or subscribe to the 4cast RSS
feed.
- *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
http://lists.oplin.org/mailman/listinfo/OPLIN4cast
<http://lists.oplin.org/mailman/listinfo/OPLIN4cast>.
© 2018 Ohio Public Library Information Network
[image: Find us on Slideshare] <http://www.slideshare.net/oplin> [image:
Find us on Facebook] <http://www.facebook.com/oplin.org> [image: Find us
on Google+] <https://plus.google.com/107751358238995507967> [image: Find
us on Twitter] <http://www.twitter.com/oplin>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20180829/842b78b6/attachment.html>
More information about the OPLIN4cast
mailing list