If you do not use Egnyte's two-factor authentication capability then you can disregard this notice.
Duo Security, the service that Egnyte leverages to provide two-step login verification, has recently announced a vulnerability in their "Duo Mobile" iOS app. This vulnerability is caused by the lack of SSL/TSL certificate hostname validation in an underlying library used by Duo Mobile. The impact of this missing validation is that it is possible to conduct a Man-in-the-Middle (MITM) attack if an attacker controls a segment of the network between the app and the Duo Security servers. However because Duo Mobile employs additional protections, attackers would still not be able to interfere with two-factor authentication.
Duo Security has fixed this vulnerability in the latest version of their iOS Duo Mobile app (version 3.7.1) published in the App Store. We recommend that you upgrade to this version as soon as possible.