In 2016 a PWC survey revealed that 32% of companies were victims of cybercrime and cost British Companies £29 billion (Source). Therefore, information and cyber security is a hot topic for 2017, and organisations are taking it very VERY seriously. Many cybersecurity policies will approach the IT infrastructure aspects first, but another key focus should be on the end-user education and discipline particularly in the areas of password management and authentication.

With passwords - it's not just a security issue - the loss of productivity of forgotten password links or contacting the helpdesk is damaging to businesses. The harbouring of passwords on post-it notes or unprotected word documents on computers is still commonplace. Worse still, using the same password across many platforms has become the norm. Saving your password onto your browser may appear to be a safe (and convenient) solution, right? Late last year Opera confirmed a successful attack on its systems where hackers were likely to be able to access personal information saved in its browsers.

The solutions

Password credentials not enough to determine a user's identity when logging however properly constructed passwords or phrases can increase the effectiveness of even just one-factor authentication, but additional factors can ensure compliance.

There have been many attempts to augment authentication methods over the years. The use of chip cards or USBs (2FA) to add a layer of protection - a great solution, but extra devices are prone to be forgotten or lost, creating a new security issue within itself.

Multifactor authentication has been around a while. This is where two or more factors are used to determine a user's identity. These factors may include:

One-factor - "something the user knows" - likely a password.

Two-factor - "something a user has" – security fobs, digital certificates.

Three-factor - "something the user is/does" – biometrics, entering a captcha.

Notice that in a true multifactor solution, no two factors are identical.

The value of Logmote

LogMote is an Identity Access Management solution with secure 3 Factor Authentication utilising a user's smartphone. A phone app alongside a browser extension is used to create a secure connection between phone and computer allowing access to passwords saved by the user.

Logmote works by scanning a QR code generated from the Logmote browser extension or Windows agent – the QR code can only be scanned by the phone app by entering a password, picture code or biometric (something the user knows or is) the user then uses their smartphone (something the user has) to scan the QR code (something the user does) which opens the extension to access commonly used applications and credentials.

A strong advantage of using a smartphone over another 2FA method lies in the fact people rarely leave home without their smartphone. Phones are also locked and require an authentication just to get into them. There is also the ability to block the smartphones use altogether if lost or stolen, a much more secure proposition than the security card or USB solution.

Logmote unifies the password and authentication process by generating randomised difficult passwords that steer the end user away from using weak or repeated credentials.

Logmote is ridiculously adoptable by end users. There are no infrastructure changes, no hardware and no additional resources required for implementation. Logmote administrators have access to a management portal where they can set up policies, manage users, block devices, or even retrieve credentials with the aid of a digital will.

Recognised by the Fintech industry, this award-winning software can assist your business with its 2017 security strategy, as UK distributor of Logmote we would welcome a chat about how Logmote can help your business. To find out more, visit our dedicated Logmote page below.

Contact us

We would love to work with you!