Before you ask the question in your head, let us answer it for you. Yes, you definitely need multi-factor authentication for your Office 365 account.
The sad truth of the matter is that today’s cybercriminals are getting more persistent, crafty, and just too good at what they do. They have adjusted their hacks from trying to directly access your device or system using phishing attacks, Trojans or direct hacks, onto something subtler.
These days the plethora of apps that we use (both mobile and desktop) means that we open ourselves to a greater risk of attack. After all, in the olden days (circa 15 years ago) we only had to worry about one to two points of intrusion. Now we have multiple sources of intrusion due to the number of connected devices we own and the apps installed upon them.
Take Office 365 for example, which is now available on desktops, tablets, and smartphones.
Thanks to a recent Office 365 update you can seamlessly share content, data and information between these devices as well as anyone else you deem necessary (using Outlook), and it can all be done in real time. This makes it really convenient when you are trying to meet deadlines, or working on a project with your team or sharing media with your significant other.
Cybercriminals also find it convenient and irresistible as they can essentially access all of your files and then spread out to your network. The tool to combat this threat is nothing new and you already probably know about it.
Microsoft’s built-in multi-factor authentication security system, named Azure Multi-Factor Auth, requires a user to not just enter their password, but also pass a verification process through one of several options:
- Phone Call – a security rep or automated voice message will call their phone to authenticate they are who they say they are using a series of questions and command prompts
- Text Message – will essentially do the same as the phone call but in text form only
- Mobile App Notification – installing the Authenticator app (aptly named Azure Authenticator) from the various mobile app marketplaces to receive command prompts from Azure MFA
- Mobile App Verification Code – enter a code through the mobile app
- 3rd party OATH tokens – if you’ve ever had to carry around an RSA token which can remotely generate an access code, this is basically the same thing
So, is the hassle worth it? That all depends on how much data you have on your device or within your email mailbox that needs protection? If you have a cloned or “throwaway” laptop (or device) that is basically used for work as a dumb terminal or basic leisure browsing and contains very little data on it, has very limited access to your network or Office 365 environment and mailboxes, then it may not be necessary to build a multi-layer fortress around your Office 365 platform.
However, if you are like the majority of users who use their mobile devices essentially as their primary communication and productivity tool, that do have significant access to network and Office 365 resources, then most likely you are keeping a significant amount of your personal and work information on your devices, network and in the cloud on Microsoft’s Office 365 data centres.
Here are some key questions that can help you decide on enabling Office 365 MFA:
- Do you email important, confidential and highly sensitive documents and files to clients, contacts and suppliers?
- Do you email important, confidential and highly sensitive data, passwords and files from your Office 365 email account to either a personal email, another work email or even back to your Office 365 email address?
- Do you do this to remind yourself to get that work done or to enable you to work outside of the office?
- Do you do this as your own personal work filing system, like so many of us do?
The answer whether to setup Office 365 multi-factor authentication or not is now hopefully obvious.
The next time you login to your Office 365 account, if you’re an administrator, click on the “Set up” or “Learn More” links next to the “Set Multi-factor authentication requirements” in the Active Users list, or contact your IT administrator to get them to look into it for you.
Note that Microsoft has started rolling out a new look portal for Office 365 admins in recent weeks.
If you have the new version, you will see a screen like this:
If you are still using the classic version of the admin center, it will look more like this:
More details of enabling multi-factor authentication for your Office 365 users can be found here.
In my opinion, it’s well worth enabling.
Read more about enabling two-factor authentication and two-step verification on different services
- Two-factor authentication (2FA) versus two-step verification (2SV)
- How to better protect your Facebook account from hackers
- How to better protect your Twitter account from hackers
- How to enable two-step verification (2SV) on your WhatsApp Account
- How to protect your Amazon account with two-step verification (2SV)
- How to better protect your Google account with two-step Verification (2SV)
- How to protect your Dropbox account with two-step verification (2SV)
- How to protect your Office 365 users with multi-factor authentication
- How to protect your Microsoft account with two-step verification (2SV)
- How to better protect your Tumblr account from hackers with 2SV
- How to protect your LinkedIn account from hackers with two-step verification (2SV)
- How to protect your PayPal account with two-step verification (2SV)
- How to protect your Yahoo account with two-step verification (2SV)
- How to protect your Apple ID account against hackers
- How to better protect your Google account with two-step verification and Google Authenticator
- How to protect your Hootsuite account from hackers
- How to better protect your Instagram account with two-step verification (2SV)
- Instagram finally supports third-party 2FA apps for greater account security