Improved Phishing Resistance: New Duo Requirements for High-risk Departments

Summary

-Enhanced Security Measures: BYU-Idaho is implementing “MFA Everywhere” and “Verified Duo Push” to require Duo 2FA both on and off campus for high-risk departments.
-Affected Users: These changes apply to specific users in high-risk departments, enhancing security and protecting against targeted phishing incidents.

Body

 Users will need to have the Duo Mobile smartphone application downloaded, installed, and actively connected to their BYU-I accounts in order to meet the security requirements defined below. For information on how to get the Duo Mobile app installed and connected please visit: the "How-to: Setup, Install, Enroll, Activate DUO Mobile" knowledge article.
Table of Contents

What's changing in Duo?

We are adding the following two security enhancements: "MFA Everywhere" and "Verified Duo Push" to a limited number of users a part of specific departments at BYU-Idaho (see Who is affected by the change? section).

MFA Everywhere

MFA Everywhere is a term used to define "where" users are required to authenticate using Duo 2-factor authentication methods. Historically, Duo 2FA has not been required "on-campus" (i.e., user's only have to authenticate with username/password & Duo is automatically bypassed while on the BYUI WiFi or wired networks). This has indeed made the user login experience faster and more streamlined for users on-campus. However, this assumes user's don't require the extra-layer of protection from Duo/2FA while here on-campus.

To harden our BYUI accounts against increasingly complex phishing campaigns, we're removing the on-campus exception that's bypassed Duo. As a result, some users will need to simply authentication with Duo/2FA "Everywhere" as the name suggests, both on and off campus. 

Simply put, instead of only being asked to authenticate via Duo off-campus, users will also authenticate on-campus, as well. 

Verified Duo Push

Verified Duo Push is a simple Duo Push, like we've been doing for a while, but instead of a simply "Approve" or "Deny" the Duo Push, the user will also need to verify the push notification. This enhanced push notification slightly changes push notifications by requiring the user to verify the 3-digit number provided by Duo in the Duo Push notification (see example image below). This number essentially has the user verify the Duo Push with the number provided by Duo. It's another small change that adds more complexity for bad actors attempting to defraud and hack innocent BYUI employees and staff.

When implemented, the end-user will be prompted with a three- to six-digit passcode after approving a push. This passcode will need to be entered into Duo Mobile before allowing the user to log in. If the user fails to enter the passcode, access is denied. This protects the user from approving login requests not made by the user and helps keep accounts and information safe. It provides additional security against push harassment and fatigue attacks by asking the user to enter a verification code while approving a Duo Push authentication request. It also provides improved fraud reporting from end-users by directing them toward the fraud report option in Duo Mobile when they receive unexpected Duo Push login requests.

What this looks like:

picture representation of a verified Duo push

Please notethis means in order to follow this standard each employee must have the Duo Mobile smartphone app setup on their personal device. For information on how to get the Duo Mobile app installed and connected please visit: the "How-to: Setup, Install, Enroll, Activate DUO Mobile" knowledge article. If you cannot use the Duo Mobile app, please contact your supervisor.

Why are we implementing these changes?

The primary reason for these changes is to protect our organization from increasingly sophisticated cyber threats. On average, human error remains the weakest link in an organization’s security chain. By adding these extra layers to our current 2FA authentication process, we aim to minimize human error and reduce our vulnerability to:

  • Hacking
  • Phishing attacks
  • Ransomware
  • Other forms of cybercrime

Key Benefits:

  • Enhanced Security: Ensures that all user logins are authenticated through Duo 2FA, providing robust protection against unauthorized access.
  • Phishing Resistance: The additional verification step with Verified Duo Push significantly reduces the risk of successful phishing attacks.
  • Consistency: Uniform security measures across all access points, both on and off campus, create a more secure environment.

By implementing MFA Everywhere and Verified Duo Push, we are taking proactive steps to safeguard our users, data, and systems. These changes are critical in maintaining a secure digital environment and protecting our community from potential cyber threats.

Who is affected by the changes?

This change will be applied to all student and full-time employees in a small number of departments that have been identified as high risk of phishing vulnerability by the CES Security Operations Center, due to a number of factors, such as hightened system access to sensitive data (banking information, account information, etc.). These departments, while not explicitly listed here, should have received communication through their appropriate management chains. 

Departments that have not received the targeted communication will continue with the current 2FA process and are thus not affected by these changes.

Where do I go for help?

Contact the IT Service Desk 

*(excluding weekly devotional, forum hour, and University Recognized holidays)

Details

Details

Article ID: 15143
Created
Thu 7/18/24 4:29 PM
Modified
Thu 7/18/24 6:00 PM