Back to Financial Education

Do the Two-Factor Two-Step

Enable Multi-Factor Authentication

Aventa Credit Union understands the risk of cyber-attacks and that’s why we use a multi-factor authentication (MFA) to keep your online accounts safe and protected.

What is an MFA?

Multi-Factor Authentication (MFA) is a two-step verification process that requires users to authenticate with another form of identity prior to gaining access to their online accounts.

What are examples of MFAs?

There are various MFA factors including:

  • An extra Personal Identification Number (PIN)
  • Security questions such as, “What is your mother’s maiden name?”
  • An access code that’s sent to either an email or text to a mobile phone
  • A biometric identifier like facial or fingerprint recognition systems
  • A unique number generated by an authenticator app such as Google, Microsoft, or Duo
  • A security token, which is a separate piece of hardware, that verifies an individual through a database or system

Why is it important to use an MFA?

Using an MFA makes it more difficult for hackers to gain access to online accounts. This is beneficial for anyone who might use the same password for all their accounts, or for those who generate an easy to remember password like, “1234.”

Businesses may also use MFAs to keep their data protected. By using security tokens, like VPNs, businesses stay protected against hackers who install password-stealing malware, that’s specifically targets remote employees. Often times, Remote employees use their own WiFi to connect to their employer’s database. With a security token such as a Virtual Private Network (VPN), companies are able to authenticate their employees more effectively in order to grant them online access while keeping the company’s network safe from password-stealing malware.

We want to ensure all Aventa Credit Union members that we have enacted cybersecurity measures to protect our computer systems against potential threats, which includes the use of MFAs for digital banking services.

Additionally, we have reinforced our security platforms to maintain the utmost level of problem identification and resolution.