Your Security is our primary focus

17 Canon Harnett Court

Milton Keynes, MK12 5NF

MON - FRI: 8:30 - 18:00

Helpdesk Opening Hours

+44 (0) 1908 410261

Customer Support

You have already been using it for years!

As Managed Security and Support providers, we have guided many people over the phone this year to set up multi-factor authentication for their different online accounts. I have found the classic scenario many times now, where the client is sick of setting up, creating passwords, checking for an SMS authentication number and so on. It can take a maximum of 10 minutes real time to protect your account with multi-factor authentication. When you compare those 10 minutes to months and months of painful recuperation after a data breach, you begin to appreciate the value of that initial 10 minute investment. True, multi-factor authentication is not the solution to every cybercrime, but it does give you an important additional level of online security.

We don’t really think about it but we have been using MFA and 2FA for decades now, and we haven’t complained. “Please enter your pincode” at the supermarket till, or “please help me with the city where you first met your husband” to speak to someone over the phone about your bank account, and the everyday 4 digit pin to get some money from the hole in the wall. Seconds out of your day, that go a long way to protecting your money, your data and even your identity. The next stage has included messages to your mobile phone, codes through an app on your phone, or digitally programmed USB keys that allow you to login to your device and your accounts.

So what is 2-Factor and Multi-Factor Authentication?

One definition explains it this way; ‘a method of authentication that uses two or more authentication factors to authenticate a single claimant to a single authentication verifier’ especially important on your network, banking websites and even social media.
It adds an additional layer of protection to ensure that even if your password has been stolen or compromised, your data stays protected, via your multi-factor authentication method. For example, if you have set up MFA on your Google account, you suddenly get a message through on your mobile phone asking: Are you logging in to a certain device with your Google account?

If it is not you, then it must be someone else trying to hack or falsely log into your account on another device. As you click “no” on your mobile screen, that person will automatically be blocked from logging in. If you add into the equation the fact that literally millions of people have no password security culture whatsoever, then 2 factor authentication becomes vital.

That is just one example of 2FA, a confirmation message on your mobile. You could also choose to use physical tokens, that banks across the world have been using since the dawn of computers, or the more recent USB security keys that you must insert into your device along with your password to gain access. Both of these external, physical devices do carry an additional cost for the hardware, but are solid security devices for busy offices, where an unwanted person could easily try and gain access to your PC.
Mobile devices are coming equipped with multiple MFA options now: facial recognition (not great when you first wake up in the morning or during the night!), fingerprints are always simple unless you are baking or fixing your car, but they are practical MFA solutions for your peace of mind.

There are also many 2FA authentication apps available that offer a constantly changing passcode, on your mobile device, that is linked to your account login, and you only have a certain time window to type in the current correct code given through the app. These apps are free and easy to set up, Google Authenticator or Authy are examples that you might choose to try.

Which MFA system is best for your business?

Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something that only you know, like an answer to a personal security question), possession (something that only you have your mobile, your Yubico key, your Google Titan Key), and personalisation (something that you are such as your biometrics: fingerprints, facial scans).

MFA is especially important in industries and specific departments where data protection is of extreme importance: Legal, Medical, Personal and Financial information are “key” examples. We will consider these specific areas in more depth in a future blog.

No doubt you will consider important factors such as business security, practical usage for your team and of course cost effective solutions that suit your IT landscape. Your Cloud Works, is available for consultations regarding MFA and 2FA, and would look forward to discussing your business requirements with you.

You can visit our website at www.youcloudworks.com or give us a call on 01908 410261 if you would like to discuss your Cybersecurity further. 

it sECURITY & sUPPORT pACKAGES

Standard Package

Entry level IT Support and Security Package

Premium Package

Premium comes packed with essential security and data backup

Elite Package

For the more securty concious business owner.

Ultimate Package

For a total security and centrally managed it environment.

Services

3CX Hosted Phone Systems

3CX hosted phone systems are cloud-based communication platforms that enhance business connectivity through unified voice, video, and messaging tools.

Application Hosting & Management

Application hosting and management involves deploying and maintaining software applications in the cloud to ensure their reliable and secure operation.

Centralised Professional Email Signature

Centrally managed email signatures. Set sleek unified signatures for the whole company.

Dark Web Monitoring

Monitor the Dark Web for compromised domain/emails from your company to limit a cyber attack.

Device Protection (Endpoint Detect & Respond – EDR)

Fully managed and monitored device protection 24/7, human led SOC, who detect and investigate, triage, and action remediation.

DNS Security and Configuration

Email security is paramount to protecting your business and brand. Configuration of a domain for email is the first step.

Domain Registration & DNS Management

Domain registration secures your web address, while DNS management ensures that people can find your website using that address.

Email Filtering, Protection & Security

Total email security that filters spam, viruses, phishing attacks and more.

Full Fibre 900mbps Business Internet

Full Fibre 900Mbps Business Internet delivers lightning-fast, symmetrical speeds to supercharge business productivity.

Google Workspace Subscription, Management & Security

Google Workspace smoothly integrates the business solutions that your team needs in one place.

Internet Filtering & Protection

Our DNS filtering solution has been ranked #1. Internet and Content Filtering at its best.

Managed Backup for Microsoft 365 & Google Workspace

Our backup solution is built in the cloud for the cloud, making it one of the fastest and most reliable cloud backups.

Microsoft 365 Security Monitoring

24/7/365 monitoring of your Microsoft 365 account to spot any configurations issues and fix them.

Microsoft 365 Subscription, Management & Security

Microsoft 365 subscriptions include familiar Office apps, intelligent cloud services, and world-class security in one place.

Network Discovery

Network Discovery provides complete security scans of your network in real time.

Password Manager

Protect your organisation against cyber threats with zero-trust enterprise password management.

Penetration & Vulnerability Testing

Automated full-scale penetration and vulnerability testing as a service.

Phishing Simulation & Security Awareness Training

Auotmate your Cyber Security Awareness & Phishing Training with YCW.

Server Support

24/7/365 Server monitoing in real time. We fully maintain, patch monitor your servers.

Support, Monitoring & Maintenance

Our IT Helpdesk is available from 8:30am to 6:00pm Monday to Friday to answer and resolve any question you may have.

Windows 365 Cloud PC

Windows 365 Cloud PC allows you to securely stream your Windows experience, including your personalised apps, content, and settings, directly from the Microsoft Cloud to any device.

WordPress Hosting

WordPress Hosting is a hosting service optimized for WordPress websites, providing easy setup, enhanced security, and performance tuning for a seamless WordPress experience.

Zoho CRM Subscriptions

Zoho CRM is a cloud-based customer relationship management platform designed to help businesses streamline their sales, marketing, and customer support processes

Learning Centre

Tech Guides

Technical Guides from Your Cloud Works

Blog

Your Cloud Works Tech Blog

Books

Published Books by Your Cloud Works

Newsletters

Tech Insider Newsletters

News

Latest News from Your Cloud Works

Frequently Asked Questions

Frequently Asked Questions by Clients

Tech Tip Videos

Technical Tip Videos from Your Cloud Works