Cyber Security

Multi-factor Authentication

Be sure who is accessing your data.

Effective IT security

How can you be sure the person accessing your IT estate is the person you intended?

In an interconnected world, how can you be sure that the user logging into an email from their phone, or dialling a VPN from their laptop is really the user you think it is? What if your user has reused their login name and password on another website, independently of your organisation and that website has been compromised?

Users reuse passwords regularly but what if they had a second password that lasted only as long as it took them to login? A password that changed every time they log in. A password not based on memory but a password-based on something they have or even, who they are. That is the premise of multi-factor authentication (MFA).

Bolster your cyber security processes

With multi-factor authentication, the door into your IT estate is no longer dependant purely on a password a user may have repeated elsewhere and had subsequently stolen.

Now, when they login to their laptop for the first time in the morning their smartphone can pop up a message confirming it as them logging in. Something they know, their password, is bolstered by a second piece of authentication, something they have.

Multi-factor authentication has become more mainstream in everyday life, logging in to popular websites from a new device often prompts a code request from your smartphone or an email appears in your inbox and many people will be familiar with the card reader machines that complement their online banking. However, as popular as multi-factor authentication has become, SMEs have, often, failed to implement it.


Why CIS?

We have over 30 years of supplying IT and electronic systems, right from the nuts and bolts to sophisticated servers, networks, software and IT infrastructure.

We understand how to dig into what is possible and ensure that the best possible cover is made with what is already available, and recommend upgrades if there are areas of weakness.

We get IT, fundamentally at the basic level.  But we also understand business, management and the need for modern approaches to reduce risk and potential fines, costs and reputational damage from not securing the electronic business assets of a company.




This site uses cookies to help improve user experience. For these reasons, we may share data with our analytics partners. By using CIS, you accept our use of cookies. Find out more