A good option for fighting phishing attacks on your organization's email accounts
May 03, 2021
A good option for fighting phishing attacks on your organization's email accounts
Score 6 out of 10
Vetted Review
Verified User
Overall Satisfaction with Duo Security
Our organization is using Duo for dual-factor authentication of our single sign-on logins across platforms and devices. It allows our user authentication process to be more secure, which is important because there have been a large number of phishing attempts sent to our employees via email over the past few years.
- Duo Security has a convenient mobile app, so all our employees can implement it and login when and where they need to.
- The app is streamlined and simple, and doesn't contain ads or unnecessary features.
- Duo Security allows our employees to not only use it for their company login, but for external logins as well, so all of their dual-factor authentication data is in one app.
- Sometimes when trying to authenticate external accounts with Duo, I have issues where the external login doesn't accept the code that Duo generates.
- I wish the codes that Duo generates would last longer before expiring.
- Duo doesn't work well with Amazon logins - I had to turn 2-factor authentication off for Amazon in order to log in, after connecting it to Duo.
- Duo Security allows our IT department to have more bandwidth to deal with other security issues.
- Duo Security gives our employees greater peace of mind that their accounts are not going to be hacked.
- Our organization saves money by not having to purchase separate security key generator dongles for all employees.
Our company has definitely benefited from using Cisco's MFA because our user authentication across our Active Directory is more secure. We receive a lot of phishing attempts via email, but the dual factor authentication helps to keep our employees' accounts from being completely hacked by phishing attempts. Even if their email is compromised, the phishing attempt does not allow the hacker to log in to the Active Directory account because they don't have the Duo authentication info.
I don't have an example for this because I have not interacted directly with Cisco's Duo Authentication support.