Make your summer stress free with Password Reset

By Vanessa Cardwell, Marketing Manager, Netutils.

Views expressed in this post are original thoughts posted by Vanessa Cardwell, Marketing Manager, Netutils. These views are her own and in no way do they represent the views of the company.

Our guess is that a number of your employees are returning from their summer holidays and can’t remember their passwords. Are we right? It’s confession time from me .. I had to think hard to remember mine!

Drink by the CaribbeanStatistics suggest that as much as 20-50% of all help desk calls are related to password problems, and the scenario with forgotten passwords after a holiday is classic and a real pain to many IT departments.

SMS PASSCODE’s Password Reset Module takes this pain away by enabling users to easily reset their own Active Directory passwords in a secure way. The solution offers automated user notification and places intuitive self-service capabilities in the hands of the user. Take a look at this video from SMS Passcode for an quick overview of how it works.

(Btw, I did remember mine in the end, in case you were wondering!)





The Leap to Token Free; Key Features of Multi-Factor Authentication Solution SMS Passcode


In this short video blog Technology Specialist Malcolm Orekoya talks us through the key features of multi-factor authentication solution SMS Passcode – including why choose multi-factor? Why multi-factor offers a more secure alternative to traditional tokens and why password delivery is so secure with SMS Passcode.

Don’t ignore the hype: IT trends deliver security with access

By Malcolm Orekoya, Technical Specialist, Netutils

Views expressed in this post are original thoughts posted by Malcolm Orekoya, Technical Specialist, Netutils. These views are his own and in no way do they represent the views of the company.

How do we enhance security but allow users access to the data and resources they need seamlessly and improve enterprise productivity, while still keeping up with the trends in mobility, consumerisation and cloud? The answer is by following those trends.

Look beyond the technology and look at the people that use the technology. This tells us two things: users do not prioritise security, and your enterprise productivity is directly related to the ability of your users to perform their tasks efficiently. So companies cannot adopt a “lock everything down” mentality. It is effectively a denial of service attack against yourself, because you are essentially denying access to the essential services needed by your users. So security, and enforcement of it, is solely the responsibility of the enterprise. It may sound harsh, but it is the reality; employees are accountable for the procedures, guidelines and policies to which they are required to adhere to.

The only viable way to build a secure network that moves with CoIT is to use existing corporate user identity systems (such as Active Directory, LDAP, SQL) to integrate with evolving ideas to automatically provision context-aware applications and resources.

So how to secure data and the network while still allowing seamless access and speedy resource allocation? Don’t ignore the trends in the IT industry. Cloud and hosted applications are continually increasing in adoption because they guarantee a certain level of security of access, ease of access, flexibility, automated provisioning, ease of upgrades, cross platform compatibility and reduced CAPEX, while maintaining compliance and security standards. The providers of these solutions are themselves heavily regulated and required to adhere to high standards of data and network security.

If you prefer to retain in-house control of applications, then virtual desktop infrastructure (VDI) means you benefit from reduced costs over time of purchasing user endpoint machines by moving to thin clients. But also these VDI platforms allow control of what applications employees have access to, and provide much more granular control on what tasks users can perform. Because a lot of the VDI platforms allow “hot-desking”, as user profiles are maintained on centralised servers, they provide access flexibility and remote access, which fit with CoIT needs.

Zero-Day protection is also another useful trend; the means by which an enterprise can protect its data and resources from threats and vulnerabilities that are currently unknown, so consequently do not have a fix. Zero-Day application exploits, targeted attacks, advanced information stealing malware and Advanced Persistent Threats (APTs) all pose a serious security threat to enterprises, but as these threats evolve, so does the approach to effective and manageable protection. Active defence, which discourages attacks by focusing on raising costs and risks to attackers, is slowly creeping into enterprise strategy. Proactive protection – including advanced Web Application Firewalls (WAF), counterstrike and intrusion deception techniques – are all protection methods that have seen a revival. For example, in 2012 Juniper Networks acquired Mykonos Software’s intrusion deception software (Junos WebApp Secure) to enhance its web application security portfolio. It places deception points along the way. When an attacker trips one of those tripwires, we are alerted to the fact they are there and can watch them.

The reality is that vulnerabilities and threats exist, and come from inside as well as outside the network. The biggest insider threats are the employees, but we can only educate staff on how to handle sensitive corporate data and how to use corporate resources. For outsider threats, innovation brings assistance.

Webinar Recording: The leap to token free; what to consider when evaluating multi-factor authentication


With the rise in systems being breached and major brands such as The New York Times, Ubisoft, Burger King and Virgin Radio falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?

Webinar Recording: SMS Passcode – Next Generation 2 Factor Authentication


Recently there has been an explosion in security breaches including attacks on high profile organisations like Sony & Citibank. Increasingly trusted 20+ year old token technology has been breached. View our 30 minute webinar and we will show you SMS Passcode a new generation of login security based on multi-factor authentication via the mobile phone SMS network, voice call or secure e-mail. SMS Passcode is a low cost solution to traditional tokens with maximum scalability, reliability, fast set up and installation.

SMS PASSCODE® Version 6.1 raises the bar with location and behaviour aware login security

In this video blog our Senior Technical Consultant, Malcolm Orekoya, takes us through the new features of SMS PASSCODE® version 6.1 . Location and behaviour aware login security protects your remote access systems and users against un-authorised access.


VMware to demonstrate SMS PASSCODE configuration as part of bootcamp

You may be interested in the recent blog post from Lars Nielsen, VP Commercial Operations at SMS Passcode.

During the recent VMware View Bootcamp – Mobile Secure Desktop: Radius 2-Factor Authentication – Mark Benson from VMware did an excellent walk through of the recently announced RADIUS support in the VMware View VDI client. SMS Passcode have been a technology collaboration partner on this project. Mark walks through the specific setup required to implement SMS PASSCODE transparently with the View client. It is an excellent brief tutorial on how easy it is to protect View with the more secure real-time, session specific multi- and two-factor authentication from SMS PASSCODE following a demonstration of a legacy token solution.  To learn more, visit the Youtube video here.

For more on SMS Passcode please follow their blog.