{"id":308,"date":"2017-11-06T12:26:17","date_gmt":"2017-11-06T02:26:17","guid":{"rendered":"http:\/\/www.smevidence.com.au\/?p=308"},"modified":"2023-11-27T00:04:00","modified_gmt":"2023-11-26T14:04:00","slug":"30disc-day-1-installing-operating-system-and-application-updates-2-2-2-2-2-2-2-2-2-2-2-2","status":"publish","type":"post","link":"https:\/\/www.smevidence.com.au\/website\/?p=308","title":{"rendered":"30DISC &#8211; Day 15 &#8211; Two Factor Authentication"},"content":{"rendered":"<p>Two is always better than one!<\/p>\n<p>Today&#8217;s challenge &#8211; Two Factor Authentication &#8211;\u00a0<a href=\"https:\/\/blog.yourultimatesecurity.guide\/2016\/03\/3dsc-day-15-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">Direct Link to Guide Page<\/a><\/p>\n<p>Many of you will already use, or have used, two factor authentication (2FA). It&#8217;s the technical name for using an additional piece of information to log into or complete a transaction on an account. Here&#8217;s an experiment &#8211; try to log into your Facebook account from someone else&#8217;s mobile phone. You&#8217;re likely to get a message from Facebook saying that you need to prove you are who you say you are, either by receiving an additional password by text message or clicking a link in an email sent to your registered email account. That&#8217;s 2FA &#8211; using an additional step beyond just the username and password.<\/p>\n<p>Many banks issue keychain dongles which generate unique numbers which have to be input when you log in or make a transaction over a particular size. The idea of today&#8217;s Challenge is to extend that sort of security into as many other accounts as you can.<\/p>\n<p>One of the most convenient and easy to implement 2FA systems is using your mobile phone to receive text messages. Whilst this isn&#8217;t a perfect system, particularly because mobile numbers can be ported without you knowing about it, it&#8217;s much better than just having a username\/password combo, and is very convenient for most people. Except when they don&#8217;t have mobile signal.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" title=\"YubiKey 4 Series\" src=\"https:\/\/www.yubico.com\/wp-content\/uploads\/2017\/09\/yubikey-4-series-sept-2017-444x444.png\" alt=\"YubiKey 4 Series Keys - YubiKey 4C, YubiKey 4, YubiKey 4 Nano\" \/><\/p>\n<p>I&#8217;ve been using a <a href=\"https:\/\/www.yubico.com\/\" target=\"_blank\" rel=\"noopener\">Yubikey<\/a> for over a year now and have found it to be a great solution for increased security. I won&#8217;t go into the details as it gets very technical very quickly, but essentially a Yubikey is a USB dongle that you have to insert into the computer (or connect via Bluetooth to your phone\/tablet) to provide the additional password. If you&#8217;ve set your account to be authenticated with the Yubikey, and someone tries to hack your account, they won&#8217;t be able to access it because they don&#8217;t have your Yubikey.<\/p>\n<p>Support for the Yubikey is growing across websites and other online services as the list of sites that have experienced significant data breaches grows. It&#8217;s not universal however, so you&#8217;ll probably still need to use your mobile as well.<\/p>\n<p>As you can see from the image above, Yubikey offers a range of options for their devices. When presented with these choices, Juan, Diana and Priscilla all chose to go with the Yubikey Nano (with Diana getting the new USB Type-C version because of her Macbook Pro only supporting USB Type-C). That way they can just leave the Yubikey in a USB port and forget about it entirely. Which is a problem if they leave their laptops unattended and someone steals their Yubikey, but it&#8217;s a huge step up in day-to-day security.<\/p>\n<p>As with the password changes, moving to a 2FA solution is a website-by-website process, but all of the team members seem really on board with this particular Challenge, so we&#8217;ll check back in with them again soon to ensure progress.<\/p>\n<p>&nbsp;<\/p>\n<p>Previous Days Here:<br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=266\" target=\"_blank\" rel=\"noopener\">Day 0 &#8211; Introduction to the Team<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=269\" target=\"_blank\" rel=\"noopener\">Day 1 &#8211;\u00a0Installing Operating System and Application Updates<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=274\" target=\"_blank\" rel=\"noopener\">Day 2 &#8211;\u00a0Set Up A Standard User Account<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=277\" target=\"_blank\" rel=\"noopener\">Day 3 \u2013 Review Privacy Settings<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=281\" target=\"_blank\" rel=\"noopener\">Day 4 &#8211;\u00a0Setup Private &amp; Secure Email<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=284\" target=\"_blank\" rel=\"noopener\">Days 5&amp;6 \u2013 Weekend Project #1<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=287\" target=\"_blank\" rel=\"noopener\">Day 7 &#8211; Install a Password Manager<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=291\" target=\"_blank\" rel=\"noopener\">Day 8 &#8211; Change Your Passwords<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=293\" target=\"_blank\" rel=\"noopener\">Day 9 &#8211; Browser Security<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=296\" target=\"_blank\" rel=\"noopener\">Day 10 &#8211; Firefox Security Add-ons<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=299\" target=\"_blank\" rel=\"noopener\">Day 11 &#8211; NoScript Security Suite<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=301\" target=\"_blank\" rel=\"noopener\">Days 12&amp;13 &#8211; WiFi Security Checkup<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=303\" target=\"_blank\" rel=\"noopener\">Day 14 &#8211; Virtual Private Network<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two is always better than one! Today&#8217;s challenge &#8211; Two Factor Authentication &#8211;\u00a0Direct Link to Guide Page Many of you will already use, or have used, two factor authentication (2FA). It&#8217;s the technical name for using an additional piece of information to log into or complete a transaction on an account. Here&#8217;s an experiment &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":267,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"_links":{"self":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/308"}],"collection":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=308"}],"version-history":[{"count":1,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/308\/revisions"}],"predecessor-version":[{"id":309,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/308\/revisions\/309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}