CORRECTION: An earlier version of the article incorrectly stated that one student has not been required to use 2-step verification. The student is registered for Heelmail 2-step and Duo. Additionally, the article incorrectly states that international calling plans are necessary to use 2-Step. This is not required. The story has been udpated with the correct information. The Daily Tar Heel apologizes for this error.
A semester after the implementation of 2-Step Verification to log into UNC email accounts, many students are still not convinced that it’s useful.
2-Step Verification was rolled out by UNC Information Technology Services for use on the Microsoft Office server that hosts the University's email accounts. It requires users to log in first with their password and a second time through the 2-Step system.
The additional login takes the form of a text message, a phone call or a pop-up notification on a smartphone.
“It takes too much time," said Tyla Gomez, a junior communications major. "I just want to get in and get out. I don’t even know what it’s for.”
According to the ITS website, 2-Step is used to provide additional protection from hackers. In July 2017, UNC experienced about 600 instances of compromised email accounts, said Dennis Schmidt, assistant vice chancellor and chief information security officer.
Often, people would receive emails from legitimate University accounts and provide login credentials that allowed an online phisher to steal information, Schmidt said. In one instance, a phisher accessed an email account and diverted a faculty member's paycheck to a bank overseas.
ITS is pleased with the impact of 2-Step Verification, said Kate Hash, chief of staff and director of communications and policy for ITS. In November, there was only one compromised account, while in December, there were none, Hash added.
“For us to go from hundreds of compromised accounts in a couple months to zero in December is huge,” she said.