Why Is Duke University Phasing Out SMS and Phone Call MFA Methods?

March 6, 2025
Why Is Duke University Phasing Out SMS and Phone Call MFA Methods?

Duke University is implementing a significant shift in its cybersecurity protocols by discontinuing support for SMS and phone call multi-factor authentication (MFA) methods. This move, which aims to enhance the security of the Duke network, will take effect for students on March 18, following a similar change already applied to faculty and staff. The rationale behind this modification is rooted in the need to fortify defense mechanisms against the increasingly sophisticated cyber threats that compromise sensitive information.

Nick Tripp, Duke’s Chief Information Security Officer, underscores that as hackers continuously evolve their tactics, so too must the cybersecurity measures employed to protect valuable data. Currently, Duke users can verify their identity via SMS codes, phone calls with keypress, or Duo-provided passcodes. However, the use of SMS and phone calls has been identified as particularly vulnerable to interception and exploitation. This discontinuation aligns Duke’s cybersecurity practices with broader industry trends and national standards, offering a modernized facade against cyber intrusions.

Enhancing Cybersecurity Measures

The primary motivation behind the shift away from SMS and phone call-based MFA is to bolster the cybersecurity framework at Duke University. As cyber threats evolve, so must the defense mechanisms in place to protect the integrity of critical data. SMS and phone call authentication methods, while convenient, are inherently vulnerable due to their reliance on unencrypted transmission. This exposes the system to potential interception by malicious actors. Nick Tripp explains that adapting security measures to counteract these vulnerabilities is essential to maintaining robust security.

In an era where cyber threats continually adapt, defensive strategies must be equally dynamic. The transition to more secure MFA methods reflects a concerted effort to stay ahead of potential breaches. By adopting advanced solutions like Duo Mobile and Duke Unlock, Duke University aims to provide its community with more resilient security measures. Duo Mobile, for instance, offers the advantage of encrypted push notifications that require active user participation, thereby reducing the risk of unauthorized access. This proactive stance on cybersecurity ensures that sensitive data remains protected against the most sophisticated attacks.

The Vulnerabilities of SMS and Phone Calls

A key issue with SMS and phone call-based authentication lies in their reliance on static codes. These can be intercepted and misused by attackers, making them a less secure option compared to modern alternatives. SMS and phone call MFA methods involve the transmission of codes over networks that are susceptible to eavesdropping. Once intercepted, these codes can grant unauthorized access to secure systems. This vulnerability is a significant concern in the current cybersecurity landscape where data breaches are increasingly common.

Duo Mobile, on the other hand, mitigates these risks through the use of encrypted push notifications. This method requires an additional level of user interaction, making it much more difficult for attackers to exploit. With Duo Mobile, there is no static information to be intercepted, thereby enhancing the security of user accounts. By moving away from SMS and phone call MFA methods, Duke University is adopting a more robust approach to safeguarding its digital infrastructure. This transition underscores the importance of using up-to-date security practices to protect against evolving cyber threats.

Compliance with Security Standards

Another compelling reason for Duke University’s transition is the need to comply with updated national cybersecurity standards. The National Institute for Standards and Technology (NIST) no longer deems SMS and phone call-based MFA methods as secure. Compliance with NIST standards is crucial for handling specific types of federal data used in university research, and adherence to these standards undoubtedly signifies Duke’s commitment to maintaining high security protocols. By aligning its practices with NIST guidelines, Duke ensures that its cybersecurity measures meet the current benchmarks set for data protection.

Nick Tripp notes that the updated NIST standards are likely to become even more integral in the future, making compliance not only necessary but also forward-thinking. Compliance with these standards fortifies the university’s ability to handle sensitive federal data, which is often integral to academic and research pursuits. By adopting MFA methods that meet the latest security criteria, Duke University is proactively safeguarding its data resources and ensuring the integrity of its research activities. This forward-thinking approach aligns with broader cybersecurity best practices embraced nationally.

Broader Trends in Cybersecurity

Duke University’s decision to phase out less secure MFA methods reflects a broader trend among major institutions and companies. Organizations such as Google are also moving away from SMS-based MFA methods, highlighting a significant shift in the cybersecurity community toward more secure options. This trend underscores the consensus that modern authentication solutions offer enhanced protection against cyber threats. By adopting advanced MFA methods, Duke University is aligning with these evolving best practices to ensure its cybersecurity framework remains robust and up-to-date.

The shift toward modern MFA solutions is part of a broader effort to adapt to the changing landscape of cybersecurity threats. As institutions adopt more secure methods, the overall resilience of digital infrastructures is strengthened. Duke University’s transition to methods like Duo Mobile and Duke Unlock exemplifies a commitment to maintaining high security standards. This alignment with contemporary best practices not only enhances security but also demonstrates a proactive approach to managing cyber risks. The adoption of more secure MFA methods is a critical step in ensuring the safety of sensitive data in today’s digital age.

Mandating MFA Across All Locations

Duke University is making a major change in its cybersecurity protocols by ending support for SMS and phone call multi-factor authentication (MFA) methods. This update, aimed at boosting the security of Duke’s network, will be effective for students starting March 18, following a similar measure already implemented for faculty and staff. The main reason for this change is to strengthen defenses against increasingly sophisticated cyber threats that can compromise sensitive data.

Nick Tripp, Duke’s Chief Information Security Officer, emphasizes that as hackers continually advance their tactics, the cybersecurity protections must also evolve to safeguard important information. Currently, Duke users can authenticate their identity through SMS codes, phone calls with keypress, or Duo-provided passcodes. However, SMS and phone calls have been identified as especially prone to interception and misuse. This change brings Duke’s cybersecurity practices in line with broader industry standards and national guidelines, offering a modernized defense against cyber attacks.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later