{"id":132,"date":"2020-11-08T08:42:28","date_gmt":"2020-11-08T08:42:28","guid":{"rendered":"https:\/\/iconit.co.nz\/?p=132"},"modified":"2020-11-12T02:17:01","modified_gmt":"2020-11-12T02:17:01","slug":"case-study-overcoming-phishing-with-2fa-or-mfa","status":"publish","type":"post","link":"https:\/\/iconit.co.nz\/index.php\/2020\/11\/08\/case-study-overcoming-phishing-with-2fa-or-mfa\/","title":{"rendered":"Case Study: Overcoming phishing with 2FA or MFA"},"content":{"rendered":"\n

One of Icon IT\u2019s clients was having an issue with phishing emails. Some of these suspicious emails were getting through their email systems without being blocked, and multiple times in one year, staff members would click on a link in an email when they shouldn\u2019t have, and then supplied their login name and password to the network.<\/p>\n\n\n\n

Obviously, they were keen to stop this, and wanted to know what their options were.<\/p>\n\n\n\n

First off, what is phishing? If you know already, then skip this bit, but phishing emails are those dodgy ones that come through with links that go off to websites that might ask for your network\/email username and password, and all sorts of other suspicious things. They might look like they come from PayPal, LinkedIn, Dropbox \u2013 all sorts of legitimate companies, but these emails are in no way legitimate.<\/p>\n\n\n\n

\n