MULTIFACTOR AUTHENTICATION
Multifactor Authentication (MFA) confirms a user’s identity only after successfully presenting two or more pieces of evidence. At ACS we deploy a diverse range of authentication solutions, be that cloud, appliance or software based. Go beyond passwords to alleviate the risk of weak or compromised user accounts.

GET THE MINIMUM REQUIREMENT WITH CYBER ESSENTIALS
- Phishing – The attacker uses a list of phone numbers or email addresses and delivers a message with a compelling call to action. An employee may be told that they need to log in and verify transactions then be sent to a fake website where they then provide their username and password.
- Spear phishing – An attacker would target a group of individuals with researched and in turn, believable messages that are relevant to them. This could use personalised content such as a name or reference to a recent event or activity. Like phishing, it then provides a call to action that encourages users to provide their credentials.
- Keyloggers – The attacker installs a program, usually a virus, that captures every keystroke on the user’s computer. This would include sites visited, usernames, passwords, answers to security questions, and much more.
- Credential stuffing – When an attacker takes advantage of the circumstance that users would often use identical username and password details across multiple accounts. They would attempt to use stolen credentials to gain access to multiple sites and applications.
- Brute force and reverse brute force attacks – When an attacker uses a program to generate possible usernames and/or passwords and gain access with them. Alternatively, an attacker would try the most commonly used passwords such as” Password123” across various accounts.
- Man-in-the-middle (MITM) attacks – This is when an attacker’s program inserts itself into the interaction between a user and an application. An example could be by impersonating a public Wi-Fi. The program would then obtain the login credentials that the user enters or even hijack the session token.
It’s important to note that MFA won’t stop all types of attacks and it doesn’t guarantee security, but it does add additional layers of authentication that make cyber attacks more difficult to be successful.
Our Process
Our true end-to-end service delivery enables clients to have a
single point of contact and offers a simple, consolidated billing process.
01.
DISCOVER
We create scalable project solutions that inspire
the path ahead.
02.
PROCURE
We will be transparent
when we procure what
we agreed together.
03.
BUILD
We will do the hard work
for you so you can
stay stress free.
04.
DELIVER
We will deliver on our promises so you can enjoy a seamless experience.
05.
SUPPORT
We have a support team committed to giving you
peace of mind.
Testimonials.
What our customers say about us.






not found what you’re looking for?
Discover our other services
technology
We provide and implement Technology for a more connected, efficient and modern workplace.
communications
We deliver integrated Communications around your workforce behaviour for real business benefit.
interiors
We create bespoke interior designs that places your workforce behaviour at the heart of our approach.
Get In Touch
We are focused and ready to respond in winning ways
We want all our clients to feel calm and assured of their choices. Our team understand that engaging ACS for workplace projects is big deal for you. Your needs are our focus and your budget can be honoured. We will take the time to discover your bespoke needs then take you on a step by step journey of delivery. Our support team are always on hand to help.
The ACS Brochure
We strive to help businesses perform at their best