With the transition to MyAccess@APS, APS has introduced two-factor authentication. This is an important part of APS’s cybersecurity efforts as we face increasingly sophisticated attempts to access our data. Since the use of two-factor authentication is becoming more common, we wanted to arm you with more facts about it and your choices related to two-factor authentication.
What is two-factor authentication?
Most authentication systems use one “factor,” which is “something you know”, your password.
With two-factor authentication, there is an added, second factor: “something you have” in addition to something you know. The most common item used for “something you have” is a phone. Using “something you have” is more secure because modern hacking tools are very good at guessing what people know. It’s much harder for them to replicate something that you have.
This is becoming the new standard for protecting your personal information in the digital age as banking and other important transactions now happen online.
How it Works @ APS
The APS two-factor authentication model relies on staff members to use their cell phones as the second factor. Staff members set up two-factor authentication by updating their MyAccess@APS profile with their cell number.
When a staff member wants to log into an APS system remotely, a text with a one-time use code will be sent to their cell phone. They will need to enter the code as part of the login process.
Cell numbers are only used for two-factor authentication and are not part of the employee’s personnel records. Staff members can remove the cell number from their profile at any time. This will remove the second factor of authentication. As a result, staff members who chose to remove the second factor of authentication will no longer be able to access APS systems from outside of the APS network.