1 00:00:03,500 --> 00:00:05,000 Good morning 2 00:00:05,000 --> 00:00:06,500 Over the past several months, 3 00:00:06,500 --> 00:00:09,400 you have no doubt heard alarming new stories 4 00:00:09,400 --> 00:00:11,900 about the damage inflicted on organizations 5 00:00:11,900 --> 00:00:15,100 of all sizes by ransomware and other attacks. 6 00:00:15,124 --> 00:00:19,624 These attacks inflict damage, both monetary and psychological. 7 00:00:20,500 --> 00:00:23,700 People find their files destroyed and unavailable, 8 00:00:23,724 --> 00:00:28,224 and companies have paid millions of dollars to make their organization whole. 9 00:00:28,500 --> 00:00:34,200 In many cases what the “bad actors” want is access to your account. 10 00:00:34,500 --> 00:00:37,300 If an unauthorized person can use your account, 11 00:00:37,324 --> 00:00:41,324 he can send email as you, initiate spam as you, 12 00:00:41,348 --> 00:00:44,348 and if he has access to your machine on campus, 13 00:00:44,372 --> 00:00:47,572 he can not only damage information on your machine, 14 00:00:47,596 --> 00:00:49,796 but he can also use your machine 15 00:00:49,820 --> 00:00:53,320 as a launching pad for inflicting much wider damage. 16 00:00:53,744 --> 00:00:58,244 Having an unauthorized person with your credentials is never a good thing. 17 00:00:59,268 --> 00:01:02,768 Often, the only thing between you and a bad actor 18 00:01:02,792 --> 00:01:04,792 is your account and your password. 19 00:01:04,816 --> 00:01:08,816 Bad actors are very good at figuring out people’s passwords. 20 00:01:09,740 --> 00:01:11,440 To make this more difficult, 21 00:01:11,464 --> 00:01:13,764 many organizations use something called, 22 00:01:13,788 --> 00:01:15,788 “multi-factor authentication.” 23 00:01:17,012 --> 00:01:22,012 Typically, when you access your account you provide an account name and a password. 24 00:01:22,036 --> 00:01:25,036 The password is considered one “factor.” 25 00:01:25,060 --> 00:01:27,060 It is something you know. 26 00:01:27,584 --> 00:01:31,884 In multi-factor authentication, you must provide more than one “factor,” 27 00:01:31,908 --> 00:01:34,908 and the second factor is often something you have. 28 00:01:34,932 --> 00:01:38,632 For most of us, that something is a cell phone. 29 00:01:38,856 --> 00:01:41,056 So, now, to use your account, 30 00:01:41,080 --> 00:01:43,480 you must know your account ID, 31 00:01:43,504 --> 00:01:44,604 the password, 32 00:01:44,628 --> 00:01:47,628 and you must have access to your cell phone 33 00:01:47,652 --> 00:01:51,952 to make a response from the device only you should have. 34 00:01:51,976 --> 00:01:55,876 You can see how this makes the bad actor’s life more difficult. 35 00:01:56,400 --> 00:01:58,200 Even if he knows your password, 36 00:01:58,224 --> 00:01:59,824 the chances are he does not have 37 00:01:59,848 --> 00:02:02,548 your cell phone in his possession 38 00:02:02,572 --> 00:02:05,672 and without both “factors,” access is denied. 39 00:02:06,996 --> 00:02:08,896 In late June Rio Hondo College 40 00:02:08,920 --> 00:02:11,820 experienced a rash of account login attempts. 41 00:02:11,844 --> 00:02:14,644 We were being probed for accounts to violate. 42 00:02:14,668 --> 00:02:16,168 To stop this probing, 43 00:02:16,192 --> 00:02:18,992 the administration decided to switch from one-factor 44 00:02:19,016 --> 00:02:21,016 to two-factor authentication. 45 00:02:21,640 --> 00:02:25,540 This required setting up your cell phone as a second factor. 46 00:02:25,564 --> 00:02:28,464 Many of you have completed this process, 47 00:02:28,488 --> 00:02:29,688 but if you have not, 48 00:02:29,712 --> 00:02:31,912 the rest of this video will demonstrate 49 00:02:31,936 --> 00:02:33,936 how two factor authentication works 50 00:02:33,960 --> 00:02:35,960 at Rio Hondo College. 51 00:02:36,500 --> 00:02:42,500 (Upbeat Music) 52 00:02:43,000 --> 00:02:45,500 Hi! My name is Sable Cantus 53 00:02:45,524 --> 00:02:47,524 and i'm the Technology Systems Trainer 54 00:02:47,548 --> 00:02:49,548 here at Rio Hondo College 55 00:02:49,572 --> 00:02:56,272 In this video I'm going to demonstrate registering and configuring 56 00:02:56,320 --> 00:03:03,320 MFA or Multi-Factor Authentication for your Rio Hondo College Microsoft account 57 00:03:04,700 --> 00:03:11,900 You have the option to enter six digits each time you log in 58 00:03:11,924 --> 00:03:16,924 or to have Microsoft send you a push notification to your smart device 59 00:03:16,948 --> 00:03:20,148 using the Microsoft Authenticator app 60 00:03:20,800 --> 00:03:25,800 In the first series of steps we're going to configure 61 00:03:25,824 --> 00:03:30,324 text messaging as a verification method 62 00:03:32,000 --> 00:03:36,500 Let's start by signing into our Rio Hondo account 63 00:03:41,000 --> 00:03:44,800 and we'll see that more information is required 64 00:03:44,824 --> 00:03:48,324 So let's go ahead and click next and start configuring 65 00:03:51,400 --> 00:03:57,200 We're going to be prompted to choose how we want to add our additional verification 66 00:03:57,424 --> 00:04:02,424 We can add an authentication phone, an office phone, or the mobile app 67 00:04:02,448 --> 00:04:05,648 Start with the authentication phone 68 00:04:06,572 --> 00:04:11,272 I'll choose United States and I'll put in my text message phone number 69 00:04:15,500 --> 00:04:20,500 And I will ask Microsoft to send me a code by text message 70 00:04:24,000 --> 00:04:29,000 I just received my text message and I'm going to enter the six digits now 71 00:04:30,000 --> 00:04:32,000 and then click verify 72 00:04:35,000 --> 00:04:39,000 I don't need this password right now I'm just going to click done 73 00:04:42,500 --> 00:04:47,800 And this time I'm going to get a code to my cell phone 74 00:04:53,500 --> 00:04:56,000 And now we are logged in 75 00:04:56,024 --> 00:05:00,524 and we have used a text message as our verification method 76 00:05:00,548 --> 00:05:02,048 Thank you 77 00:05:02,072 --> 00:05:05,072 (Upbeat music)