> Cyber Security Strategy - From Idea to Mobile App RealityVinova Our team will brainstorm with you on where to begin, where to go, and how to get you there. Whether you have a spark of an idea or an existing app – we can help. Getting your mobile strategy right is what our unique services are all about. We’ll wrestle with business challenges, discover new opportunities that will help you define and refine your product ideas into mobile app reality.

Cyber security boost for Inner Range with 2FA

Cyber security boost for Inner Range with 2FA

Figures show one in ten employees will have their security username or password compromised by cyber criminals. For people operating access and security systems, preventing this kind of cyber breach is even more important. Tim Northwood, director of Inner Range, discusses how Two Factor Authentication (2FA) provides an extra layer of cyber security for customers.

Benefits of 2FA

Two Factor Authentication (2FA), which is offered by Inner Range’s intelligent integrated access and security management system, Integriti, ensures operators must present their usual username and password as well as an additional security credential. This includes extra security passwords or memorable information, biometrics such as thumb or finger prints and facial scans, or a code received on a registered device, such as via an app on a mobile phone.

Using 2FA means customers can rest assured that any potential rogue users with stolen usernames and passwords will still be denied access.

Easy company-wide set up

The initial set-up for company-wide use of 2FA within Integriti can be completed within a few minutes by activating 2FA and adding it to a security policy that makes 2FA a requirement for system operators.

Operators are then asked to enroll in 2FA at their next login. For this, they are prompted to scan a QR code using a compatible authenticator app on a mobile phone or other device, and enter the 6-digit code provided.

Enrolled operators need to enter the code provided by the authenticator each time they login. The codes time-out after 30 seconds to ensure maximum security.

If anyone forgets their phone or device needed to generate 2FA codes, a system administrator can provide a single-use login token.

Robust cyber strategy

At Inner Range, we’re proud of our 30+ years with not a single reported cyber breach. Last year we announced a new coordinated cyber strategy to ensure the most robust security for customers.

This included forming a cross functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.

We also ensure all networked products undergo penetration testing by independent accredited laboratories to assess security and probe for vulnerabilities.

Cyber threat assessment is included at every stage of Inner Range’s product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories.

Inner Range only deploys hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-leading cloud hosting environment that offer redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.

Finally, we offer cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.

For more information about Inner Range’s cyber security measures and award-winning security systems, please contact the sales team on 0845 470 5000 or ireurope@innerrange.co.uk

The post Cyber security boost for Inner Range with 2FA appeared first on Inner Range.

This content was originally published here.

Malcare WordPress Security

web design services singapore,mobile app developer singapore,website design singapore,website developer singapore,app development singapore,developer in singapore,singapore mobile application developer,mobile apps development singapore,web development singapore,web application singapore,app developer singapore,website development singapore,web design singapore,ruby on rails developer singapore,mobile application development singapore,singapore web design services,mobile apps singapore,mobile game developer singapore,design agency singapore,design firms in singapore,mobile application developer singapore,web design company singapore,developers in singapore,android developer singapore,web development company singapore,mobile developer singapore,singapore website design,singapore app developer,singapore web design,singapore mobile app developer,graphic designer in singapore,singapore web development,website designer singapore,mobile app development singapore,web designer singapore,ios app development singapore,ios developer singapore