Skip to page content
Client Hub Tel 01892 830111
Book a call

Blog

Cybersecurity: MFA

By Russell Gower-Leech, Cybersecurity Manager | Published 25 Oct 2021

Make it harder for the hackers to access your accounts with MFA.

Russell Gower-Leech

Russell Gower-Leech

Cybersecurity Manager at Select Technology, Russ has a huge love for all things security working hard building security into ours and our clients culture.

Latest cybersecurity articles

  • How to catch a Phish
    With the media attention Cyber Crime has been given over the past 12 months it is clear that the risks are increasing all the time. According to IBM, Cyber Crime is now worth an estimated $450 Billion per year and more worrying is that it’s not showing any signs of slowing down.
  • Plan for the Worst, Achieve the Best
    Obviously this isn’t an all-encompassing check list for Disaster Recovery (DR) planning, but it should provide a high level starting point. Availability, or uptime, are priorities for all businesses big and small. The keys to which are understanding and planning. -One important…
  • Cybersecurity Awareness Month: 5 essential top tips you need to know for a secure password
    When it comes to remembering things, humans can be pretty rubbish at retaining information. Increasingly in our lives we rely more and more on technology to assist us in the form of smart assistants and wearables to…
  • Cybersecurity Awareness Month: Select Technology are officially ISO 27001 certified!
    Select Technology are officially ISO 27001 certified! As we continue to recognise Cybersecurity Awareness month, Select Technology are very pleased to announce that we have now achieved our ISO 27001 certification in Information Security…
  • How to be a Savvy online Shopper
    Black Friday and Cyber Monday have become two of the main shopping events in people’s calendars throughout the year. It’s a great time to find deals and bargains in the run-up to Christmas, but unfortunately, it also means that online scamming and…
  • How safe are you online? Check out our top tips to make sure you’re Cybersecurity Savvy
    Unfortunately, potential security threats are everywhere, so it’s important for us to be as aware of these as possible
  • Securing the new normal
    We discuss cybersecurity with Neil and Russell, what are the threat and risks, what are the solutions, and how can we protect ourselves.
  • Security Tips For Working From Home (WFH)
    As you’re probably all bored of hearing by now, Working From Home/Remotely is the new norm for pretty much anyone that can. For those of us who’ve been doing this for a number of years we can kind of take this for granted asking ourselves “What’s the big deal?”. It’s actually been a recurring point of conversation amongst my colleagues friends and family and it got me thinking, initially all the talk has been…
  • Select Webinar: Cybersecurity
    Join our Technical Solutions Architect as we discuss cyber security, from why you should care, security tips and working from home.
  • The Dark Web: What is it?
    The dark web is term that is used often in the news, when you hear about data breaches and in films used by clandestine groups, but do you really know what it is?
  • Choosing an MFA Solution
    By now I’m sure you’re all familiar with the terms “MFA (Multi Factor Authentication), 2FA (Two Factor Authentication) or Strong Authentication” over the last few years, for those of you that aren’t these are largely the same thing (there are some technical & semantical differences but for simplicity let’s not get into those) in that they support your traditional Username & Password
  • Spotting a phish
    Phishing is the most popular form of cyber crime. It’s scam form that has been around for years from the comical prince to the current COVID-19 disguise.
  • Common phishing types
    Cybercrime is on the rise and the types of phishing scams are evolving, our ability to identify them has never been more important in both protecting ourselves, but also the organisations that we are part of. There are many types of phishing scams with many different tactics employed, in this article we look at some of the main phishing scams used by the criminals, the intent or nature them and advice on how to deal with them.
  • Cyber Security: Playing the Blame Game
    I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they’re called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I’ll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.
  • How to keep your company data safe with a Dark Web Monitoring demo
    A live demo of our dark web monitoring tool showing how it works, why it works and how some of the phishes steal data and leak/sell it.

View all cybersecurity articles >


Let's get started

Book a call today to discuss
how we can work together.

Book a call Let's talk
Contact Us