

But you have your second factor (your smartphone or token) safely in your possession, so he can't get any further. When he tries to log in, he's asked to provide your second factor. Now imagine: An attacker successfully steals your MIDAS ID and password. One person - just one - logs in to what he believes to be Leo Online, only to realize later that his account was compromised and his direct deposits have been redirected to the attacker's bank. Or this: An attacker sends an email to several employees, and the message appears to come from payroll. Until we catch the suspicious activity, the attacker has access to all of that student's ODU data. One student - just one - is fooled by the email and unwittingly hands over her MIDAS ID and password. Imagine this: An attacker sends an email to several hundred ODU students. The truth is, we have seen more professionally organized and sophisticated phishing attacks against our ODU community in the past year than ever before, and passwords are no longer a strong enough protection on their own. After logging in to an ODU system with your MIDAS ID and password, you'll be prompted to confirm your identity a second time using a physical device in your possession (like a smartphone or token) that's been attached to your account. Two-factor authentication adds an additional layer of security to online accounts by requiring you to verify that you are who you say you are. As an added layer of protection, we require all faculty, staff and students to log in to ODU services using two-factor authentication. Phishing attempts are at an all-time high, and a single compromised MIDAS account poses a risk to sensitive university data and critical services. Reactivate Phone Two-Factor Authentication at ODU If you replace your phone, reactivate your phone at :

SEND ME A PUSH DUO INSTALL
Log in with your MIDAS ID and password to view these guides:Įnroll in Two-Factor Authentication when you create your MIDAS account install and activate the duo mobile app Log in with two-factor authentication manage two-factor devices frequently asked questions
