Figures show one in ten employees will have their security username or password compromised by cyber criminals. For people operating access and security systems, preventing this kind of cyber breach is even more important. Tim Northwood, director of Inner Range, discusses how Two Factor Authentication (2FA) provides an extra layer of cyber security for customers.
Benefits of 2FA
Two Factor Authentication (2FA), which is offered by Inner Range’s intelligent integrated access and security management system, Integriti, ensures operators must present their usual username and password as well as an additional security credential. This includes extra security passwords or memorable information, biometrics such as thumb or finger prints and facial scans, or a code received on a registered device, such as via an app on a mobile phone.
Using 2FA means customers can rest assured that any potential rogue users with stolen usernames and passwords will still be denied access.
Easy company-wide set up
The initial set-up for company-wide use of 2FA within Integriti can be completed within a few minutes by activating 2FA and adding it to a security policy that makes 2FA a requirement for system operators.
Operators are then asked to enroll in 2FA at their next login. For this, they are prompted to scan a QR code using a compatible authenticator app on a mobile phone or other device, and enter the 6-digit code provided.
Enrolled operators need to enter the code provided by the authenticator each time they login. The codes time-out after 30 seconds to ensure maximum security.
If anyone forgets their phone or device needed to generate 2FA codes, a system administrator can provide a single-use login token.
Robust cyber strategy
At Inner Range, we’re proud of our 30+ years with not a single reported cyber breach. Last year we announced a new coordinated cyber strategy to ensure the most robust security for customers.
This included forming a cross functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.
We also ensure all networked products undergo penetration testing by independent accredited laboratories to assess security and probe for vulnerabilities.
Cyber threat assessment is included at every stage of Inner Range’s product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories.
Inner Range only deploys hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-leading cloud hosting environment that offer redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.
Finally, we offer cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.
For more information about Inner Range’s cyber security measures and award-winning security systems, please contact the sales team on 0845 470 5000 or email@example.com