Lawcovernotes July 2019
3. Trusted Devices. This is a ‘push- based’ MFA method showing location data that tells the user when someone is trying to access their accounts or device from an unknown location. The alert then prompts the user to either authorise or deny access. Services like banks also have built in settings which enable the user to activate MFA. Regardless of the method, all MFA has the same goal – keeping your accounts, systems and services safe and your legal practice operating securely. Cyber attackers want an easy target and while implementing MFA does not remove all risk, it does make it much more difficult to access the information they need. This means you are a much less likely to be targeted which reduces the risk to your legal practice and protects your sensitive data, systems and accounts. Talk to your IT department or IT support provider about implementing MFA in your legal practice. Further information Additional information about MFA including methods and implementation can be found at the Australian Cyber Security Centre (ACSC).
Made with FlippingBook
RkJQdWJsaXNoZXIy NzMzNDIy