{"id":132,"date":"2020-11-08T08:42:28","date_gmt":"2020-11-08T08:42:28","guid":{"rendered":"https:\/\/iconit.co.nz\/?p=132"},"modified":"2021-05-19T17:31:54","modified_gmt":"2021-05-19T05:31:54","slug":"case-study-overcoming-phishing-with-2fa-or-mfa","status":"publish","type":"post","link":"https:\/\/iconit.co.nz\/index.php\/2020\/11\/08\/case-study-overcoming-phishing-with-2fa-or-mfa\/","title":{"rendered":"Case Study: Overcoming phishing with 2FA or MFA"},"content":{"rendered":"\n

One of Icon IT\u2019s clients was having an issue with phishing emails. Some of these suspicious emails were getting through their email systems without being blocked, and multiple times in one year, staff members would click on a link in an email<\/a> when they shouldn\u2019t have, and then supplied their login name and password to the network. In this blog post we aim to show you the steps to overcoming phishing with 2FA or MFA.<\/p>\n\n\n\n

Obviously, this company was keen to stop staff clicking on things that they shouldn’t, and wanted to know what their options were.<\/p>\n\n\n\n

What is phishing?<\/h2>\n\n\n\n

First off, what is phishing? If you know already, then skip this bit, but phishing emails are those dodgy ones that come through with links that go off to websites that might ask for your network\/email username and password, and all sorts of other suspicious things. They might look like they come from PayPal, LinkedIn, Dropbox \u2013 all sorts of legitimate companies, but these emails are in no way legitimate.<\/p>\n\n\n\n

\n