There are four common forms of second factor authentication: Using a hardware security token or an authenticator application, such as Microsoft Authenticator, provides the best security. As there are scenarios where a hardware security token cannot be used the most robust second factor to use is an authenticator application. Account security can be improved by…Continue Reading Microsoft Authenticator
What kind of technical support does S&T offer?
Here at S&T, a lot of the work done revolves around technology. Each and everyday students and staff log on to complete their various tasks for the day, but what do you do if something goes wrong with your computer? Who do you contact for any form of technical assistance? Luckily, we have a wonderful…Continue Reading What kind of technical support does S&T offer?