MULTIFACTOR AUTHENTICATION

Multifactor Authentication (MFA) confirms a user’s identity only after successfully presenting two or more pieces of evidence. At ACS we deploy a diverse range of authentication solutions, be that cloud, appliance or software based. Go beyond passwords to alleviate the risk of weak or compromised user accounts.

Cyber Essentials Internal Image

GET THE MINIMUM REQUIREMENT WITH CYBER ESSENTIALS

  • Phishing – The attacker uses a list of phone numbers or email addresses and delivers a message with a compelling call to action. An employee may be told that they need to log in and verify transactions then be sent to a fake website where they then provide their username and password.
  • Spear phishing – An attacker would target a group of individuals with researched and in turn, believable messages that are relevant to them. This could use personalised content such as a name or reference to a recent event or activity. Like phishing, it then provides a call to action that encourages users to provide their credentials.
  • Keyloggers – The attacker installs a program, usually a virus, that captures every keystroke on the user’s computer. This would include sites visited, usernames, passwords, answers to security questions, and much more.
  • Credential stuffing – When an attacker takes advantage of the circumstance that users would often use identical username and password details across multiple accounts. They would attempt to use stolen credentials to gain access to multiple sites and applications.
  • Brute force and reverse brute force attacks – When an attacker uses a program to generate possible usernames and/or passwords and gain access with them. Alternatively, an attacker would try the most commonly used passwords such as” Password123” across various accounts.
  • Man-in-the-middle (MITM) attacks – This is when an attacker’s program inserts itself into the interaction between a user and an application. An example could be by impersonating a public Wi-Fi. The program would then obtain the login credentials that the user enters or even hijack the session token.

It’s important to note that MFA won’t stop all types of attacks and it doesn’t guarantee security, but it does add additional layers of authentication that make cyber attacks more difficult to be successful.

Our Process

Our true end-to-end service delivery enables clients to have a
single point of contact and offers a simple, consolidated billing process.

01.

DISCOVER

We create scalable project solutions that inspire
the path ahead.

02.

PROCURE

We will be transparent
when we procure what
we agreed together.

03.

BUILD

We will do the hard work
for you so you can
stay stress free.

04.

DELIVER

We will deliver on our promises so you can enjoy a seamless experience.

05.

SUPPORT

We have a support team committed to giving you
peace of mind.

Testimonials.

What our customers say about us.

“ACS have expertise and are not sold on selling you anything that they have, they will sell you a solution that is right for you.”

Rob Parkes
Head of commercial operations at the Silverstone experience

“By working in partnership our IT spend is fixed and user satisfaction has also increased across the business.”

Paul Griffiths
Chief Executive- Northamptonshire Chamber

“We have been using ACS as our preferred supplier for 9 years after a recommendation from a parent. We purchase our day to day IT equipment from ACS. I can rely on them to deliver and supply the technology that I need within my budget. The overall services that ACS provide are cost effective, reliable and the team is always friendly.”

Chris Dicken
Teacher & IT Coordinator- Parklands Primary School

“ACS have been our trusted partner of choice for best value workplace ideas and IT support for 21 years. A ‘true’ partnership means you share the good times of growth and the tough times the economy can give you. A 21 year partnership speaks volumes!“

Simon Bond, O’Riordan Bond
Joint Managing Director

CEHCisco Coloured LogoKnow Be 4 Coloured LogoMicrosoft Gold Partner Coloured LogoMimecast Coloured LogoWebroot Coloured Logo

not found what you’re looking for?

Discover our other services

IT Managed Services

technology

We provide and implement Technology for a more connected, efficient and modern workplace.

Workplace Communications

communications

We deliver integrated Communications around your workforce behaviour for real business benefit.

Office Interior Solutions

interiors

We create bespoke interior designs that places your workforce behaviour at the heart of our approach.

Get In Touch

We are focused and ready to respond in winning ways

We want all our clients to feel calm and assured of their choices. Our team understand that engaging ACS for workplace projects is big deal for you. Your needs are our focus and your budget can be honoured. We will take the time to discover your bespoke needs then take you on a step by step journey of delivery. Our support team are always on hand to help.

The ACS Brochure

We strive to help businesses perform at their best