Tag Archive for: step

One Step Ahead: Duo Mobile: The Best Way to Two-Step


One Step Ahead: Duo Mobile: The Best Way to Two-Step

One Step Ahead logo

Another tip in a series provided by the Offices of Information Security, Information Systems & Computing and Audit, Compliance & Privacy

Two-Step Verification has been implemented for most PennKey users at the University of Pennsylvania. The fastest, easiest way to verify yourself for Two-Step is to use the Duo Mobile application on your smartphone (available for both Android and iPhones).

See for yourself how this works at https://www.isc.upenn.edu/how-to/two-step-faq

While Penn supports other verification code delivery methods like key fobs and SMS texts, Duo Mobile is the recommended solution. Key fobs can be lost, accidentally fall out of sync, and rely on non-replaceable batteries that eventually will fail. Verification codes sent by SMS text message usually require network access to work, and may be delayed or go undelivered due to network or carrier issues.

Duo Mobile avoids these problems. Verifying your identity by approving a “push” prompt is fast and requires no typing. Even when you lack network access, verification codes can still be instantly generated on the Duo Mobile app.

To set up and configure Duo Mobile, find detailed Two-Step instructions here: https://www.isc.upenn.edu/how-to/two-step-verification-detailed-instructions

When Duo Mobile is configured, a Two-Step Verification prompt can be accepted by tapping on “Approve,” with no need to type in a verification code. If you have inadequate or non-existent Wi-Fi or mobile data access, you can still use Duo Mobile by opening the application, tapping the University of Pennsylvania profile, and entering the verification code shown onscreen.

Note that with Duo Mobile, enrolling a new or replacement smartphone requires a brief setup process (even when using the same phone number as a previously enrolled device):

  • Generate one-time use codes before getting the new phone.
  • After the new phone is in hand, go to your Two-Step dashboard by signing in and using a one-time verification code if necessary, and then select “New Phone for Duo Push.”  
  • Enroll your phone in Duo Push without having to re-enroll in Two-Step…

Source…

Simon Fell column: GSK legacy next step for MP


On Thursday the GSK Taskforce met to discuss where we have got to since the announcement in February that GSK would be pulling out of Ulverston and selling its business to Sandoz. At the outset, we had three main aims:

* Getting a good deal for current employees – ensuring transparency and protection in relation to training and retention.

* A public recommitment by GSK to its previous undertakings to the community – namely a donation of £2m to the Ulverston Leisure Centre, and the gifting of land to South Lakeland District Council to be used for economic development.

* Support from GSK to Lakes BioScience to provide the best possible opportunity to establish a viable business on the vacated site, and enabling them not just to retain the specialist skillsets developed locally over so many years but also to expand on them.

Securing those agreements involved a huge amount of effort. Among other things, my team and I lobbied the Prime Minister, the Secretary of State for Business, and the Health Secretary. It also involved a corresponding effort by GSK who have worked really constructively with Government and with me to get to this positive point.

The next step will be the trickiest, namely to define what a good legacy from GSK will look like. I’m grateful to everyone who has shared their thoughts with me on this (ranging from the very reasonable and achievable to those less so).

Our next Task Force meeting will involve examining those ideas and starting our negotiations towards achieving the best outcome for the community and the area.

On Tuesday I chaired the All-Party Parliamentary Group for Cyber Security where we discussed the Online Harms Bill and how to strengthen it. The Bill is designed to stop the internet and social media being used to share hate, abuse and other illegal and unacceptable behaviours, and to improve online safety.

We heard presentations by experts from academia and business, as well as from organisations directly affected. One was the End Violence Against Women Coalition who spoke movingly about how seriously online harm caused by stalking and harassment affects people and explained why the Bill as proposed needs to…

Source…

Keeping One Step Ahead – Consistent Cybersecurity for your Business


What’s the best way to provide consistent security, at scale, at all times throughout your business? Nick Burrows explains how the successful path to Industry 4.0 is undoubtedly through cybersecurity.

Industrial manufacturing is increasingly at a tipping point as organisations attempt to embrace Industry 4.0. It’s no longer a maybe – it’s about when and how. And the biggest challenges include how do I change decades of people, process, policies and technology to achieve this change? Manufacturing has never faced such a mountain to climb, and a need to achieve it within a very short period of time to ensure survival. Industrial manufacturing is all about up-time, safety, keeping plants running and people safe. It’s about supply chain integration and, increasingly, it’s about modernising the factory floor with sensors, wireless technologies, analytics and machine learning that reduces costs and keeps manufacturing relevant to today’s world.

Functionality and production efficiency

While functionality and production efficiency are understandably seen as having a higher priority than cybersecurity, no company should attempt the move to Industry 4.0 without focusing on cybersecurity as a vital component in every decision and process. Cyber-attacks increasingly target not just IT systems, but also critical operational technologies (OT) – sensors, devices and software used in manufacturing operations. The convergence of these systems means that attacks against either IT or OT systems (or both) have the potential to ruin production efficiency and cause significant financial impact. A recent report by the Ponemon Institute suggests that the average cost of a successful cyber-attack is more than US$5m. As threats continue to evolve, the industry is being forced to change and manufacturing needs to keep a step ahead.


Cybersecurity – image courtesy of Rutgers

Image Courtesy of Rutgers

How should industrial manufacturers respond?  Several starting points are:

• Operational Technology (OT) and SCADA (Supervisory Control and Data Acquisition) are just as critical as Information Technology (IT) in cybersecurity…

Source…

Rochester-area hospitals step up cyber-security after scattered hacks


The Rochester area’s two major health systems say they are stepping up cyber-security amid warnings that criminal hackers are targeting hospitals with crippling digital attacks.

Loading...

Load Error

As of mid-day Friday, University of Rochester Medical Center and Rochester Regional Health said their hospitals had not been attacked.

But at least six smaller hospitals in New York state’s North Country have been hit by the attackers, who can seize control of computer systems and freeze all activity. They typically demand payment of thousands of dollars of “ransom” before unlocking the captive computers.

If the targets don’t pay, data can be destroyed and their computer systems can be hobbled for days or weeks.

The hackers most often are able to plant ransomware, as their surreptitious software is known, by tricking employees to open phony emails doctored to look like internal communications. The ransomware is unleashed when an employee clicks a link or opens a file in the email.



a street scene with focus on the side of a building: Eugene Polisseni Pavilion which is the main entrance at Rochester General Hospital in Rochester on March 3, 2020.


© Tina MacIntyre-Yee/ Rochester Democrat and Chronicle
Eugene Polisseni Pavilion which is the main entrance at Rochester General Hospital in Rochester on March 3, 2020.

Three hospitals in St. Lawrence County were affected beginning Tuesday, according to a statement from St. Lawrence Health Systems reported by local media there.

Three other hospitals in Franklin, Clinton and Essex counties, affiliated with UVM Health Network in Vermont, were affected  beginning Wednesday or early Thursday.

U.S. cyber-security agencies warned of imminent assaults on Wednesday. The New York Times reported that the hackers are Russian criminals who have 400 U.S. hospitals on their hit list.

A health system in Oregon and another with hospitals in northern Michigan and Wisconsin also have reported ransomware attacks this week.

The on-going coronavirus pandemic gave added urgency to the alarm, as hospitals in some parts of the country are dealing with an overflow of COVID-19 patients.

Rochester Regional Health, which has two hospitals in Monroe County and…

Source…