8914 Stone Green Way , Louisville, Kentucky 40220-4072

Support: (502) 473-6407 | Sales: (502) 473-9330

Argentum IT

Get Support

  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us

Newsletter Content

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Home
Categories
Tags
Categories:   All Categories
Suggested keywords
x
Search

Colleges Begin to Implement Two-Factor Authentication to Improve Network Security

Newsletter
Dean Lause
Tuesday, 18 April 2017
0 Comments
Colleges Begin to Implement Two-Factor Authentication to Improve Network Security

Has your business dealt with a phishing attack? If not, consider yourself lucky. There has been a massive spike in phishing attacks as hackers are aggressively going after organizations and the personal identifiable information they hold. These attacks are just not focused on typical businesses either, they are going after organizations that provide public goods. One place that has become a major target for hackers (and phishing attacks) are schools.


At first glance, a college would be one of first places any hacker would look to steal information. Not only do today’s colleges have vast, powerful networks, they have many people that regularly compute on those networks who don’t take network security into account in the least. Despite the work of diligent IT administrators, the actions of the students and faculty on the network can really cause a lot of problems, so can direct attacks on the same students and faculty. For this reason, many colleges are starting to implement two-factor authentication procedures to ensure that even security-negligent college students aren’t putting their entire organization’s network at risk.

Two-factor authentication, for those who do not know, is the practice of requiring two steps to gain access to the network in the form of questions. The design is pretty simple, and has been around for a while. Traditionally, a user would type in a password which would prompt another access authenticator code. That electronic authenticator (also called, fob) would provide the user a code to use to access the door. Nowadays, most of the two-factor authentication credentials can be sent to an individual’s mobile device, as an overwhelming majority of people rely on smartphones.

In an article on KrebsOnSecurity, the Director of IT security and Infrastructure at Bowling Green University, Matt Haschak, stated that these attacks had grown from a relatively benign 250 in 2015 to over 1,000 in 2016. These attacks are carried out to steal credentials used to access BGSU’s MyBSGU portal, the main hub for student, staff, and administration affairs for the university. With these credentials, hackers can then infiltrate a system that is populated with thousands of people’s personal information.

Bowling Green isn’t the only example. Other universities have recently been targeted by what their IT security personnel calls “spear phishing” attacks, going after specific people associated with the college. This includes club officers, athletics administrators, and other people who would have access to “fast cash”. While IT administrators are cognizant of these relatively new threats, they tend to evolve and victimize before anything can be done about them.

One instance of this happened at the University of Delaware where scammers are targeting international students. These extortion attempts tell the target that if they don’t pay, they will face deportation under U.S. law. This shows that these attacks are specifically tailored to the recipients, making detection nearly impossible for IT administrators to ward against.

“This is something unusual,” UD IT communications group manager Richard Gordon said, “This is a scam that had not been seen at other universities before. It shows how these scammers are always looking for ways to try to hit students.” Gordon advocates diligence and integrating some type of two-factor authentication system for all accounts that hold sensitive information. “If the account information is stolen, then someone can get into your account. But if you have two-factor authentication, then they can’t access it because they need the extra security code. It’s an extra security piece.”

While college IT administrators have their hands full, your business is often considered low-hanging fruit for these hackers. If you want to learn more on how to protect your network, staff, and your business from these types of phishing attacks, contact our trusted team of IT technicians today. We can assess your current IT setup and consult with you on how to improve your organization’s network security. Call us today at (502) 473-6407.

Tags:
Security Privacy

About the author

Dean Lause

Dean Lause

Dean Lause is a technologist to the highest degree. When he was in middle school, he learned and developed small programs using BASIC programming code on his Commodore 64. He was one of the first to post to bulletin boards on the newly emerging “Internet” and built a mini-network in his home. He competed in his senior year of high school, placing 1st regionally, 2nd in State and 17th Nationally in computer specialist competitions. Today, he enjoys technology as much as he did then. In fact, he has a “Smart Home,” with connected devices controlled by A.I., mobile apps, and voice commands. When he is ready to go to sleep, all he needs to say is “Good night,” and Voila! all of the lights in the entire house turn off, the doors lock, the TV/DVR turn off, the house alarm is set and the alarm clock for the morning is ready to go! After a 4-year stint in the Army as a computer specialist, Dean spent the next 20 years in Fortune 500 Enterprise IT environments. He quickly building his IT skill set, becoming an expert in VMWare and Citrix and various other technologies. Dean served as the Director of Network Infrastructure & Security of North American Operations in his last role before joining Argentum IT and completing his MBA with a specialty in Accounting in 2011. Dean understands not only the technical side of how devices work together and integrate within an environment, but also understands and designs the environment from a business point of view for productivity. He strives to provide cost-savings, efficiency and practicality to solve the real issues that are present for each individual client he works with. Leveraging his 20+ years’ of enterprise-level experience, for the past ten years, Dean has consulted with numerous Fortune 500 companies across the country on issues relating to network infrastructure and security, Citrix XenDesktop, VMWare implementation and capacity planning, Office 365/Exchange Email Migrations as well as Mobile Device Management and Disaster Recovery Planning. He has also been engaged to develop and improve technology processes as well as accomplish technology projects on time and budget. Today, Dean uses all of these skills and more to aid small to medium-sized businesses to utilize technology to run their companies more profitably and efficiently. As Chief Technical Officer of Argentum IT, LLC for the past ten years, Dean has supervised a proactive service desk who educates clients on technology best practices, designed multiple infrastructure environments for clients (both big and small), to fit their needs and built a sizeable hosted infrastructure environment – including VMWare and Citrix “products”. Dean’s breadth of experience affords him a unique view of IT and business challenges, which allows him to help customize and develop unique solutions to solving IT and Cyber Security challenges.

Author's recent posts

More posts from author
Friday, 30 May 2025 What Goes Into Data Backup? (It’s More Than You Think)
Thursday, 29 May 2025 How to Hit the Sweet Spot Between Innovation and Frugality
Wednesday, 28 May 2025 The True Price of "Quick Fixes" is Probably More than You Expected
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, 01 June 2025

Captcha Image

Customer Login

Remember me
  • Forgot your password?
  • Create an account

News & Updates

On A Mission To Simplify IT, Dean Lause Turned His Parents IT Struggles Into Inspiration And Became The Premier IT Solution For Small and Medium Sized Businesses in Louisville, Kentucky

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Read More

Contact us

Learn more about what Argentum IT can do for your business.

(502) 473-6407

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.

Powered by JoomConnect
  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us