As the latest step in the University of Iowa’s continual efforts to strengthen its cybersecurity, all employees will need to use two-step login to access the Employee Self Service website starting March 8.
Two-factor authentication enhances security because in order to gain access to sensitive data and systems, you must provide your HawkID and password and then verify your identity with something only you have in your possession, like a cell phone, office phone, or single-use codes generated in advance.
The second step prevents criminals from accessing a host of private information in Self Service—tax forms and paycheck direct deposit preferences, to name a couple—if a HawkID and password were ever compromised. Criminals sometimes steal those credentials through phishing email or phone scams, or when people reuse usernames and passwords to access external websites with security vulnerabilities.
“Two-Step Login protects your access to sensitive and critical applications because the second login step proves it's you—not an attacker,” says UI Chief Information Security Officer Jane Drews.
Employee Self Service is a key online gateway to safeguard because it’s the portal to UI human resources and administrative records like payroll, benefits, timecards, training, personnel files, emergency contacts, and forms routed for approvals. Going forward, Two-Step Login will be expanded to more web applications that use HawkID login. Integrations with other applications will be prioritized based on risk.
Duo Mobile app recommended
Two-Step Login is easy to use. While almost any phone can be used to complete the second step (or the single-use codes can be generated in advance), the Duo Mobile app is recommended as the quickest, simplest method. After entering your HawkID and password on the website, you use your mobile phone or tablet to complete the process with a swift swipe of the finger.
The app can also generate single-use codes to complete the second step when you have no service—which will come in handy if you travel internationally to places you may lose cellular service. If you work in an area with poor cellular or wireless reception, or if you don’t own a smart phone, an office phone or the codes are the next best second-step verification methods to use.
Instructions for enrolling
- Signing up takes only minutes. Employees can enroll at https://apps.its.uiowa.edu/uip-tools/two-step from a campus computer, or by clicking "Manage Duo Two-Step Login" on the personal tab of Employee Self-Service.
- Instructions for enrollment and tips are available at https://its.uiowa.edu/two-step. Common questions are addressed under the “how to and support” tab.
- If you need extra assistance, contact the ITS Help Desk or reach out to your local IT support professionals.
- UI Health Care employees: please note that the hospital is also implementing Two-Step Login with Duo Security for Health Care accounts on remotely accessible applications. Enrollment of a Health Care account for Two-Step Login uses a separate process. For questions on UI Health Care account enrollment, contact the HCIS Help Desk.
Use of two-step verification grows
The majority of UI employees already use Two-Step Login with Duo Security to access Employee Self Service. They enrolled voluntarily to boost the security of their information, or were already required to based on their level of permissions in HR applications. The UI first implemented two-factor authentication in spring 2014 and has seen steady growth in adoption.
Two-step login is becoming increasingly common as more financial institutions, companies, and universities have adopted this security measure to shelter vital information and systems.
“Many UI employees embraced this IT security measure on their own, recognizing that it’s a simple way to better protect personal and institutional data,” Drews says. “Requiring Two-Step Login and eventually extending it to other critical applications will expand our protection to even more people and systems.”
Drews says she appreciates everyone’s cooperation in this important security initiative.
“Cyber criminals continually develop new ways to hijack accounts and steal valuable information, redirect funds, attack others using our name, or steal identities for profit,” she says. “As threats grow, we must add more layers of protection to safeguard our data.”