As phishing becomes more widespread and as attackers learn to make their phishing attempts more and more devious, exposure of usernames and passwords has become one of our primary cybersecurity risks. The best way to mitigate this risk is to use multifactor authentication. By doing so, a stolen credential alone will no longer provide access to Fermilab systems because one must also use a second factor to authenticate to these systems.
We will soon require the use of multifactor authentication for VPN. Beginning April 15, if you do not have a properly installed and configured Fermilab Root CA certificate on the devices you use for laboratory VPN access, you will receive an error message when you attempt to log in to the VPN client. Configure your certificate now if you haven’t already. The next step will be to issue MFA tokens.
Multifactor authentication has been in use at Fermilab for more than two years for a very limited group of employees. However, due to increased cybersecurity risks to our lab data, this will soon change. Currently, individuals who need access to our sensitive financial, HR and security systems use MFA. Over the next several months, we will be taking steps to expand MFA, most notably, to include VPN access.
Advanced persistent threats are different from typical cyberattacks. They attempt to obtain personal information to later gain beachheads in other unrelated computing systems. Image: Dell SecureWorks Those of us who work in cybersecurity would prefer to avoid publicity. In most cases when you hear or read about security it is because something unfortunate has happened. And in fact there have been headlines in the past few days about a security incident affecting the federal Office of Personnel Management. The types…