Recently in Housing Executive our operations director John Blackburn outlined some of the biggest IT challenges facing the social housing sector and the role that outsourcing could play in resolving them.

When it comes to IT provision, housing associations (HAs) aren’t known for their big budgets, and there is increasing pressure to streamline systems and demonstrate greater return on investment. However, privy to large amounts of sensitive data, they still need access to high-quality, robust tech support.

Achieving budgetary and operational efficiency

Managing a range of complex, integrated systems and portals is no easy task for social housing IT professionals. And with an increasing number of daily help desk tickets being raised — comprising login queries, authentication issues, antivirus questions, and more — everything can rapidly feel like a competing priority.

Enlisting the help of an experienced IT partner — whether for help desk requests and security, or larger technology integration and transition projects — can bring significant financial and operational benefits.

Offering the ability to scale up or down as required, it means housing associations have the support they need, and only pay for what they require at that moment in time – with the guarantee that the resource will be readily available.

It is commonly misconceived that outsourcing IT replaces in-house teams. The reality is the two can, and should, complement and enhance one another. With external assistance, internal teams can afford the time and headspace to focus on the core business applications and tactical future of the HA’s tech stack, without getting engrossed in help desk issues.

Overcoming recruitment challenges


The shortage of high-level talent within IT teams and beyond is a growing concern for social housing organisations across the UK. Not having the right personnel in place can greatly impede growth, stifle efficiencies and productivity, and result in spiralling recruitment fees. And this will remain a reality if a solution is not found.

To help avoid skills shortages within technology departments, outsourced teams could hold the answer – whether temporarily or permanently.

As experienced specialists who are highly skilled in their role, they can be engaged at short notice to bring an immediate solution to an urgent project need. Furthermore, outsourced teams regularly work across a spectrum of clients and industries, which means they can use knowledge and learnings from other projects to help quickly solve persistent issues. 

Ensuring a strong security posture


The dramatic shift to more flexible, hybrid, and digitally focused ways of working means that effective cyber security strategies are essential — enabling full visibility over software and hardware updates, antivirus technology, firewalls, Virtual Private Networks (VPNs), and more. But it also affords more secure access control – ensuring only authorised personnel within the organisation can gain entry to sensitive data.

Specialist outsourced IT support can also work with housing associations to improve the performance of virtual and physical servers, including when they should be backed up and at what frequency — whilst also devising a robust recovery plan. This details the steps to be taken to regain access and functionality to IT infrastructure — following events such as natural disasters, cyber-attacks, or business disruptions. For example, in the case of a hacking attempt, what data protection measures will the recovery team have in place to respond?

By having processes and procedures for a disaster recovery plan set up, and regularly testing and optimising security and data protection strategies, social housing providers can successfully navigate such challenges.

Obtaining peace of mind

Against the current backdrop of IT-resource challenges and economic uncertainty, having the flexible, specialist support of outsourced IT can not only alleviate some of the burden but boost efficiency too – providing housing associations with the peace of mind that their IT infrastructure is fit for purpose both in the present and for the future. 

In a digital-dependent world, the social housing sector is under more pressure than ever to streamline IT infrastructure, to ensure technology brings benefits across every department. So, what are the main IT challenges faced by the industry and, with limited financial resources, how can you tackle them head on?

Our operations director, John Blackburn, outlines some key IT hurdles and how working with a trusted technology partner can help you overcome them.

Challenge 1: Reliable IT infrastructure

A strong IT infrastructure is essential for success. Outdated legacy software could mean your IT network is underperforming, be unsuitable for your evolving needs, and have flaws leading to several hidden security risks.

Before upgrading or replacing infrastructure, you first need to gain an accurate picture of what infrastructure you currently have, what works well, and what needs improving – along with being clear on what the end-goal looks like.

Challenge 2: Security threats

Sadly, every organisation is likely to encounter a security threat at some point, whether through natural disaster, or for personal data through phishing, hacking or malware that seeks to disrupt the information technology infrastructure. Therefore, being able to keep networks protected should be a priority for IT teams – no matter where staff are located.

Challenge 3: Backup and disaster recovery

Your data is one of the most valuable assets your organisation has. If that data is lost, it could have devastating effects for your reputation, operations, and bottom line. Therefore, it is essential that you have a reliable disaster recovery plan in place. This details the steps to be taken to regain access and functionality to IT infrastructure after events like a natural disaster, cyber-attack, or business disruption.

By having processes and procedures in place, and regularly testing and optimising security and data protection strategies, social housing providers can successfully navigate this challenge. While this might seem to be a complex or overwhelming task, with the support of trusted experts, implementing an effective backup and disaster recovery strategy will be stress free.

Challenge 4: Cost management in the cloud

Factors such as remote working, cyber security, data handling, and safe storage have led many housing associations to adopt cloud-based platforms over recent years to help them work seamlessly and securely. Cloud subscriptions are a significant expenditure within your IT budget, and if you’re not organised in your approach to using it, you risk losing control of your cloud spend.

As usage increases across different teams and departments, the overheads of using the chosen platform can grow rapidly. In addition, Microsoft recently implemented an extensive shake-up of its software licensing arrangements, with a price increase on some of its most popular subscriptions.

To control costs, housing associations should tap into the expertise of a trusted IT partner who can help you understand the difference between the various cloud management systems and licence options available. They can also help you save money on maintenance, unused services, or unnecessary add-ons, to get the best out of your cloud management platform.

Challenge 5: Having a clear IT strategy

Straightforward implementation of IT systems can pave the way for cost-savings, modernisation, and agile working. It’s vital that all elements work together, and that you have a roadmap for your technical approach, to prepare your business for future challenges and support scaling operations. Having a technology partner who specialises in consultancy services will provide clarity and direction for your strategy.

If you need assistance overcoming any of these IT challenges, get in touch with Central Networks today. We pride ourselves on being a strategic technology partner with a human touch — making IT stress free. You can also find out more about the projects we’ve worked on with other social housing providers, here!

With such a relentless number of pressures facing organisations across the UK, settling into the pattern of another new year isn’t the only challenge right now. But navigating such a multifaceted role means the stakes are particularly high for the social housing sector.

As well as managing everything from recruitment challenges and already stretched IT budgets, to the effects of ongoing geopolitical turmoil, the responsibility to serve a growing demographic with specialist properties and support continues. Having traditionally been reluctant to adapt to technological innovation, the sector is still battling with inefficient — and often redundant — legacy infrastructure too.

But it’s not just about wholesale change. By shifting priorities and opening doors to greater opportunities, social housing organisations can drive powerful progress over the coming months. Here, client director at Central Networks, Mike Dunleavy, explores which IT advancements will have the biggest impact in 2023…

Expecting and accepting downtime 

With the increasing proliferation of cyber attacks, it’s only natural to feel overwhelmed by the possibility of downtime – not least with the oft-cited statistic looming, which states that £3.6m could be lost by organisations each year as a result.

Of course, there are so many reasons for IT to become momentarily out of use – from malicious malware downloads, to natural disaster strikes, general human error, and more. But accepting these feats as inevitable means shaking responsibility altogether.

By instead taking a proactive approach to maintenance, housing associations can prevent unprecedented cyber attacks in their infancy, minimise unproductive work hours, protect costs, plus safeguard company reputation amongst customers, partners, and stakeholders alike. Above all else, foolproof training procedures must take centre stage this year — ensuring teams feel empowered to spot potentially risky nuances in the network.

Overlooking the benefits of outsourced IT support 

Talent attraction and retention is a major concern for all organisations. But with the growing lack of resource, economic struggles, and nationwide digital skills shortage, housing associations are under increasing pressures.

The return on investment offered by outsourcing key IT needs – such as help desk support and proactive network maintenance – is well worth its weight in gold. Not only do specialist teams offer years of experience, spanning a variety of industries, they also often boast lower costs, and enable you to focus internal resources on your core business strategy. 

Paying for redundant tech 

Digital transformation needs are evolving constantly. And without a CTO or finance team in place to focus on the strategic future of your housing association, a lot of organisations will find themselves running into trouble – implementing knee-jerk, sticking plaster solutions that serve limited long-term purpose. 

With both finances and human resources stretched in countless directions, the pressure to introduce the fastest and cheapest fixes into the tech stack is immense. But what many IT leaders also forget when solving organisational challenges, is that future growth must be taken into consideration too. 

A major part of this strategy, is to invest in infrastructure that’s truly scalable. In being able to flex up and down as required, firms won’t risk overspending on overprovisioned technology – because it will grow in line with evolving business needs.

Assuming that productivity is a given

With a limited number of resources to tap into, housing associations are navigating the need to do more with less. And the current economic backdrop, coupled with rising recruitment pressures, means this feat will only become more of a challenge in 2023.

Ensuring the right infrastructure is in place will be a major driver of productivity. Being technologically savvy is not a given, for example – no matter how digital our world has become. So, will the new ways of working suit your employees? And will the right support be in place to help with a seamless transition?

Failing to replace legacy infrastructure

Like many industries, archaic legacy systems are seriously hampering growth in the social housing sector. As well as being costly to maintain and worse for the environment, they’re often incredibly unreliable – not to mention dangerously unsecure.

Most of the time, IT leaders and CFOs are well aware of this. However, the prospect of mapping out a well-considered digital transformation project is often far too daunting. This is an issue that will only grow in severity over time, so appointing the right support to facilitate such a transition – optimising infrastructure, whilst keeping costs as low as possible, and minimising the risk of downtime – is crucial this year, if not done already.

Further procrastination will simply not suffice, unless organisations want to place business continuity, cyber security, team productivity, and customer satisfaction at greater risk.

Keen to continue this conversation? Central Networks is an outsourced IT partner, specialising in realms spanning cloud services and digital security, to managed help desk support, strategic consultancy, and more. Simply get in touch, to see how we can help drive your social housing firm forward – in 2023, and beyond.

You can see how we’re supporting the likes of Welsh housing association ateb Group, and provider of housing and community services, One Manchester, by visiting our sector page.

Our service desk manager, Nick Bowling, recently shared his cybersecurity predictions with TechRound. If you missed the original article, you can catch up here…

A perfect storm for cybercriminals

As many organisations try to make cost savings in 2023, their focus will likely shift towards projects and products that seemingly offer more immediate and tangible value and benefit. Those that deliver on security can sometimes be difficult to justify in budgets.

But with hybrid working now the norm and firms using more technologies to stay connected, cybersecurity and risk management measures need to take centre stage.

If cybersecurity isn’t prioritised, cybercriminals will capitalise on poorly trained users and weak security within businesses’ ICT systems — at a more accelerated rate than ever. This could pave the way for the worst year on record for cyberattack volumes.

‘Insider risk’ could grow

Also, while there’s a focus on implementing technologies like multi- and two-factor authentication to plug gaps and improve security, it's possible that ‘inside jobs’ will increase.

More employees may be targeted by attackers, in a bid to obtain key business-critical information or gain low-level access to ICT systems. And if successful, this data could then be used to access often weaker internal systems.

Given statistics show that over 70% of global organisations were victimised by ransomware attacks in 2022, regular training and penetration testing will therefore be an unnegotiable part of organisations’ security strategies.If your organisation needs IT and cybersecurity support, please get in touch with the Central team by filling out the web form, emailing info@centralnetworks.co.uk, or calling 01706 747474.

For public and third sector organisations, digital transformation holds a more valuable seat at the table than ever right now – enabling government services and programmes to be delivered more efficiently, transparently, and cost effectively across the board.

But with already significant pressures being exacerbated – by the cost-of-living crisis, nationwide skills shortage, and increasing proliferation of cyber attacks, amongst other factors – keeping pace with progress can feel like a challenge.

That’s why the G-Cloud 13 Framework is such a valuable service. Aiming to simplify the process of procuring cloud-based services and solutions, the Crown Commercial Service (CCS) initiative lists only the highest standard of UK tech providers. 

Following a rigorous application and review process, Central Networks is proud to have secured a position on this agreement. With our portfolio of hosting, software, and support aids now available via this digital marketplace, we’re looking forward to helping more organisations achieve maximum commercial value when purchasing common goods and services.

Speaking on the achievement, our director of operations, John Blackburn, commented: “Having partnered with a variety of charities, healthcare providers, and educational institutes throughout our 30+ years of operation, we’re well aware of the challenges and opportunities facing public sector organisations. 

“With this efficient and trusted route to procuring cloud computing services, drawn-out tendering procedures can be switched for an end-to-end, automated vendor comparison process. By reducing the risk of data silos, optimising technical resources, and improving regulatory compliance across a variety of industries, SMEs can reap the benefits of enhanced citizen support – in 2023, and beyond.” 


To discover more about how Central Networks’ position on the G-Cloud 13 Framework can benefit your public sector organisation, please get in touch with our team of specialists. Or, if you want to browse the online catalogue and choose from over 40,000 services, head to the CCS website

Downtime occurs when a technology-related product or service is out-of-action and unavailable for use. This can either be planned – when upgrades and configurations are required, for example – or entirely unexpected due to systemwide failures, power outages, cyber security attacks, and more.

With an oft-cited statistic declaring that UK businesses could be losing an average of £3.6 million a year as a result – including 545 hours of wasted staff productivity – this impact is significant. And whether you’re an SME or blue-chip organisation, swallowing such spend is simply not an option in today’s uncertain economic climate.

The reality is, no organisation enjoys 100% uptime. But by developing a deep understanding of outage implications and how to minimise them, IT teams can build that all-important resilience to keep operations running as smoothly as possible. Our operations director, John Blackburn, explores this further…

Lost revenue: Whether it’s revenue lost in sales, paying out of pocket for recovery costs, or compensating unmet Service Level Agreement (SLA) commitments that have hindered business continuity elsewhere, a large part of the downtime sum will be related to direct finances. In the case of service outages, customers are unlikely to wait for the problem to be resolved and will instead be pushed towards competitors.

Tarnished reputation: Measuring intangible costs, such as business reputation, is a much more challenging assignment - and one that isn’t as easily reflected in numbers either. But that doesn’t make it any less severe. For customers, partners, and stakeholders alike, a network outage can significantly damage how much faith is placed in your service – particularly if you don’t react promptly, or the issue is ongoing. When Facebook suffered a global outage last year, the stock ended the day down nearly 5%!

Hindered productivity: Unplanned IT downtime can terminate work for an entire organisation for hours, and sometimes days, at a time. And for companies that rely on the public cloud for development efforts, as well as to communicate, the ability to do anything productive in this time comes to a complete standstill. For larger organisations paying a greater number of employee salaries, the impact is even greater.

How IT outsourcing can minimise risk 

The first step to reducing the risk of IT downtime is through proactive monitoring and maintenance of the network. Instead of waiting for a problem to arise, or implementing a knee-jerk sticking plaster solution to cover the cracks, carry out a full health check of your tech stack. External IT partners can offer an invaluable service here, if you’d prefer not to eat up precious in-house resource.

A specialist third-party will not only advise where upgrades and repairs are required, but also take a proactive approach to ongoing upkeep – acting as an extension of your team to ensure systems are running efficiently in the background and enabling you to focus on more revenue-generating, value-add tasks. If you choose the best fit for your organisation, this relationship will be completely headache-free, and significantly minimise the cost of IT downtime.

If you’re keen to continue the conversation, why not get in touch for a no-obligation discussion? We’d love to chat through your requirements.

To say cyber-attacks can be devastating is an understatement. But when you consider how underfunded charity organisations and their teams are in particular, the realisation that the not-for-profit sector is one of the most targeted is a difficult one to swallow.

Across the UK, there are almost 200,000 registered charities in total – from animal welfare and child protection services, through to cancer relief and mental health support.

And while it should seem unconscionable to pose threat to any of these organisations, the number of perpetrators seeking financial gain from stealing valuable data is evident.

According to the National Cyber Security Centre’s (NCSC) Cyber Threat Assessment, valuable funds, supporter details, and information on beneficiaries, remain primary motivations across the board.

So, what can be done to mitigate these growing risks? Here, client director at Central Networks, Mike Dunleavy, offers some crucial insight…

Understand the risks and how to spot them 

As with any organisation, employees are the first – and often most powerful – line of defence against cyber-attacks. That’s why developing a detailed understanding of what motivates threat actors, as well as how they might attempt to compromise vulnerabilities within your systems, is crucial.

It shouldn’t just be a tick-box exercise, but something that’s constantly on the agenda from one month to the next. Running regular audits of your tech environment and testing employees on their ability to spot malicious phishing or malware attempts are just some examples to help fortify your charity organisation. 

Be mindful though, because trying to adopt a one-size-fits all approach to educating your teams will only result in low engagement. Instead, ensure that training programmes and cyber security insights are specific to individual roles and responsibilities.

By resonating with the day-to-day minutiae of a person’s routine, they can see the true scale of the problem, how exactly it might impact their own work, and what a ‘best practice’ approach to help mitigate any dangers might look like. 

Remember that prevention is always better than the cure 

Once you’re aware of the risks you face as an organisation, you’ll have a better understanding of how you can bolster lines of defence.

With the increasing sophistication of cyber-attacks, it should go without saying that it’s important to get the basics right. Think watertight password policies, multi-factor authentication, and being vigilant when it comes to opening unknown links and accessing unfamiliar sites. 

But if the shift to ‘work from anywhere’ models has taught us anything, it’s that the most effective cyber security strategies run much deeper. No matter where your teams work, a dedicated IT division should have complete control over every device.

This not only enables full visibility over software updates, anti-virus technology, firewalls, Virtual Private Networks (VPNs), and more, but it also enables more robust access control – ensuring only authorised personnel within your non-profit organisation can gain entry to sensitive data. 

From part-time volunteers to full-time employees, it’s important that every colleague knows how to uphold the security stance of the charity right from the very beginning. 

Invest in a tough business continuity plan 

According to The Charity Commission, one in eight charities (12%) have experienced cyber-crime in the past year – yet just 55% see enhanced security as a fairly or very high priority. The reality is, the benevolent nature of these firms places them at a growing risk.

But let’s say all the right procedures are in place, and a perpetrator still manages to slip through the net undetected. What happens then? To help minimise downtime and reverse the effects of a breach as quickly as possible, having a robust business continuity plan in place is a must. 

Whilst the purpose of disaster recovery is to find and repair the root cause of the problem, this strategy helps to keep mission-critical operations running as smoothly as possible on the route to reinstating ‘business as usual’.

As a living document, this should constantly evolve in line with your charity’s evolving needs – with periodical testing ensuring every detail is appropriate, and the person in charge is still capable of carrying our designated tasks.

Such a proactive approach may seem full on, but it will pay dividends if it’s ever needed. And trust us when we say disaster will usually strike when you least expect it. 

Turn the tables on attackers 

Charity or not, anyone who has fallen victim to a cyber security attack will have at least one thing in common: they never thought it would be them. That’s why it’s better to ask too many questions before handing over sensitive data, rather than asking too few and it ending up in the wrong hands. 

Better still, beat attackers to it. While defence is a crucial part of the cyber security equation, it’s only half of the puzzle. Instead of waiting to be notified about a breach, offensive approaches tap into the hacker tradecraft, and utilise human analysts who can think like the enemy to identify any warning signs.

Penetration testing, for example, simulates a real-life attack and shows how the action would unfold, step-by-step – rather than simply scanning for vulnerabilities and handing the insight over in a report. It’s the perfect way for charities to stay agile in today’s constantly evolving cyberwar landscape.

One of our partners, Cyphere, recently spoke about this defence mechanism in greater depth, in our recent Q&A.

Of course, budgets are a significant restraint for any non-profit organisation, but combining as many of these examples as possible will maximise security posture, help protect precious data, and mitigate any financial or reputational damage in the long run.

Keen to continue the conversation? Central Networks has a glowing reputation when it comes to arming companies in this space – from social housing organisations to hospice care services.

If you want to know more about creating a bullet-proof cyber security strategy for your charity, please don’t hesitate to get in touch. We’d be happy to have a no-obligation chat about your requirements. 

Tracked as CVE-2022-32894, the first vulnerability which the update is set to fix is situated in the iPhone Kernel – the core of the operating system – and could allow an application to execute malicious code with kernel privileges, which grants unauthorised and undetected access to the device.

The second issue patched in iOS 15.6.1 is a flaw in WebKit – the browser engine which powers Safari. Known as CVE-2022-32893, successful exploitation of this vulnerability could allow a threat actor to achieve arbitrary code execution if the target visits a maliciously crafted website. Again, this could provide complete control over a user’s device.

In the most extreme attacks, perpetrators use two or more issues in conjunction to successfully infiltrate protective barriers. And, as has been seen with this example, it’s not uncommon for cyber criminals to break into the device's browser – such as WebKit – as a means to enter the wider operating system and access sensitive personal data.

How do zero-day attacks work?

A zero-day attack occurs when hackers exploit a flaw in security infrastructure before the software developers have the opportunity to address it.

Because the vulnerabilities are not always discovered immediately, they can cause long-lasting effects for individuals and organisations alike – not least due to the fact that the only people who know about the zero-day attack are the perpetrators themselves.

Not only can exploits get sold on the dark web for significant sums of money, but attackers can also decide to sit and wait for the most opportune moment to strike rather than infiltrating a network immediately.

What does this mean for the future of security?

While, naturally, this news has caused concern for individuals and organisations across the globe, Apple’s rapid response to the incident showcases exactly why proactive patch management is the key to creating – and maintaining – more robust security infrastructure.

Because attacks are becoming increasingly sophisticated, and cyber criminals are constantly on the lookout for vulnerabilities to exploit, software developers and IT teams must equally be keeping a sharp eye on any abnormalities that require attention.

But it’s not just up to the professionals to be proactive – users of any affected devices must also be quick to implement necessary updates as and when they become available, to mitigate the consequences of an attack.

There’s no denying that such vulnerabilities will continue to occur – both in Apple products and within other software – but maintaining a proactive approach to patch management and sight over emerging updates will no doubt maximise the security posture of individuals, as well as organisations large and small.

We provide patching services to firms within both the public and private sectors. If you'd like to find out more about how we can help your company, please don’t hesitate to contact a member of the Central team.

We’re always here to help.

One of the biggest shortcomings of user ID and password logins from tech users across the globe is that details can be easily compromised, causing irreparable damage and leaving organisations significantly out of pocket as a result.

Whether through malicious malware, phishing attacks, or automated password cracking tools, perpetrators have a whole host of methods to gain entry into your systems. And as the cyber warfare climate continues to become increasingly volatile, the risk of having one or multiple of your accounts hacked is only becoming more of a threat. 

That’s why multi-factor authentication (MFA) is such a crucial line of defence in any security strategy today.

So, what is multi-factor authentication? 

While two-factor authentication (2FA) previously formed the foundations of many online security protocols, vendors are increasingly turning to MFA to help augment their levels of protection – not least because the Cyber Essentials scheme recently made MFA mandatory on all cloud service accounts in order to pass certification.

Combining two or more independent credentials – from passwords and security tokens to biometric verification methods – MFA is a state-of-the-art security technology which uses a layered defence mechanism to protect a target.

If a user is unable to verify their identity, they will be rendered as an unauthorised personnel and refused access to the desired data or resource. Plus, if one factor is compromised or broken, the remaining elements act as a fortress to keep attackers from breaching any further barriers and gaining entry.

But with so many MFA combinations available, how can firms ensure they’re choosing the best fit for their needs on both a cultural and commercial level?

Here, the team at Central delves deeper into key considerations to factor into your decision-making…

Five tips to help you choose the best MFA solution for your organisation

Of course, needs and requirements will differ from one firm to the next, but there are some crucial elements that will help you lay the foundations of your security strategy when it comes to multi factor authentication.

1. Cost and ease of deployment

As with any tech investment, the initial cost of implementing an MFA solution can be a barrier for many. However, the benefits that come to fruition long-term will make the return on investment (ROI) worthwhile.

For companies with a tighter budget, managed IT partners can help to spread the cost of maintenance on an ongoing basis – including server infrastructure, hardware distribution, and vendor support.

It’s also important to understand that, with the wrong solution, deployment can be a complex task with time consuming configurations needed to onboard employees – which can be even more challenging if your network environment is a hybrid of on-premise, cloud-based, and custom applications. That’s why we’d recommend getting users to self-enrol rather than putting a heavy admin task on one individual.

2. User-friendly authentication

MFA should not only be easy to roll out, but it should also be simple to use. Some employees may not feel confident in approaching a security request, and others may be limited when it comes to resource access – not everyone has a smartphone, for example. Plus, without advanced warning of MFA protocols, users can feel blindsided by the process and will instinctively reach out for support and reassurance – which naturally swells workload for the IT team.

With this in mind, it’s important for organisational leaders to ensure that cost and security are balanced with usability and understanding across the entire scope of a team to increase acceptance.

3. A variety of pre-built integrations

The best MFA providers will offer pre-built integrations with a broad spectrum of popular business applications – so you can both easily authenticate your employees and better manage and protect your security network.

This doesn’t just apply to everyday productivity tools either, but those bespoke to your own firm that may not be available off the shelf. Check whether your prospective MFA solution supports custom integrations with applications and services or more industry-specific examples.

4. Flexibility and scalability

In such a mobile world, it’s important that any tech solution you implement is flexible to support employees, irrespective of location, in their time of need. If a user is trying to access data off-site, but doesn’t have a hardware token such as a USB to hand, they should still have an option to use software tokens such as smartphone apps or push notifications, as well as biometrics such as facial recognition or fingerprint scanning, to authenticate their identity.

And, because business environments are becoming increasingly volatile, any MFA solutions need to be scalable too, so it can be deployed across your entire organisation and levelled up or down as required. This means security practices should be consistent from one employee to the next, and cover all users – whether working in the office or remotely, and accessing cloud or on-premise applications.

5. Reporting and analytics

Data provision should be one of the key factors you consider when comparing MFA solutions. The most value-adding MFA solutions will give you a clear oversight of your firm’s security landscape to help both improve processes and support compliance and auditing initiatives.

For example, reports that detail when are where authentication attempts are taking place can help to identify any malicious activity, so you can revoke access to unsecured devices that are compromising your security posture.

Closing thoughts 

There’s no denying that MFA is a powerful tool that can bring an abundance of benefits to organisations of varying shapes, sizes, and sectors – not least when it comes to adding that extra peace of mind to access security. 

But it’s important to remember that a successful solution will be utilised by the entire team, which is why making sure it suits the needs of everyone – from apprentices and help desk support officers to C-suite executives – will play a key role in headache-free implementation.

While there’s rarely a one size fits all approach to any element of tech in the business world, these steps should help to offer a starting point to guide your MFA journey.

As always, if you need any further support to help enhance your security strategy, please don’t hesitate to get in touch with one of our experts. We’d be happy to help.

In the meantime, why not follow us on LinkedIn and Twitter?

In today’s cyberwar climate, everyone is a target – not least for malicious phishing emails.

An attack vector used by criminals to gain access to personal information – such as login credentials or banking details – phishing usually manifests in email, SMS, or telephone messaging. By posing as a trusted sender to dupe targets, perpetrators present a significant threat to organisations large and small, with the potential to gain dangerous foothold into corporate networks and compromise sensitive information.

What’s more, with the increasing sophistication of cybersecurity attacks, it can be hard to differentiate genuine digital communications from fraudulent ones. Emails sent from malignant senders may read well and look professional – sharing an acute likeness with examples that have landed in your inbox before – but that doesn’t always mean they’re legitimate.

However, by exercising caution and looking out for the major warning signs, there are ways to arm yourself from these invasive attacks. Although state-of-the-art technology is available to help identify threats, it’s unrealistic not to expect some to slip through the digital net – that’s why humans must be a primary defence, too.

So, without further ado, here are five tell-tale signs that you should bear in mind…

1. Grammatical errors and misspellings

An immediate signal that an email has come from an untrusted source is that it contains grammatical errors and spelling mistakes – whether that’s one or two, or riddled throughout the entire copy.

This is because phishers don’t have access to the same resources that professional writers do, and so their work has seldom been proofed and standardised by another pair of eyes. Because cybercriminals also spend a lot of their time distributing malicious messaging, their attacks are often rushed and therefore more likely to contain errors.

Of course, legitimate emails can sometimes land with minor mistakes, likewise fraudulent ones aren’t always replete with typos, so be sure to consider other factors before jumping to conclusions.

2. Inconsistencies in email addresses, link, and domain names

Looking for discrepancies in email addresses, links, and domains is another way to identify potential phishing attempts. Unless made explicit previously, a sender’s email address should align with prior correspondence – if it doesn’t, this should raise alarm bells.

It’s also worth checking that embedded links throughout a message correlate with the pop-up that appears when a cursor is hovered over the top. For example, if you have received an alleged email from Central Networks, yet the domain of the link doesn’t include ‘centralnetworks.co.uk’, you should flag this as a potential threat. Checking for misspelling is also crucial here, as a sender may pose an almost identical alternative, such as ‘centrallnetworks.co.uk’.

3. Suspicious attachments

Stretched, blurred, or pixelated images – as well as attachments that are unexpected, don’t offer a preview, or have an extension commonly associated with malware downloads (.sys, .exe, etc.) – should arouse suspicion. However, with the right software, recipients can scan these for viruses before choosing how to act.

If an infected attachment is presumed to be benign and opened, it will unleash malware onto the victim’s computer and enable cybercriminals to perform any number of nefarious activities.

Unless you’re entirely confident in the legitimacy of an image or attachment, it’s always best practice to leave them unopened. You could always contact the sender through an alternative method to verify the contents, if you think it might be important.

4. A sense of urgency

Perpetrators have a tendency to create panic in their digital communications, largely because swift decision-making has the ability to cloud judgement and leave errors undetected – ultimately ruining their plans to compromise your data.

While urgency can take shape in various ways – such as suggesting that an account is restricted, that details have expired, or even threatening negative consequences if a demand is not met – the likelihood is, someone who had a genuine need for haste would reach you on a personal contact number to speak directly.

Always be cautious with time-sensitive requests, and make sure they align with something you’d expect. For example, if you’ve just had a failed attempt to log into a Microsoft account and received an email saying that your password must be reset, it’s probably real – though be sure to check for other areas of concern so you can be confident it’s not a cyber-attack.

5. Unusual requests or an unfamiliar tone

Intuition is a real virtue in the digital world. If an email arouses suspicion because it doesn’t seem like something you’d usually be approached for, or how someone would usually communicate with you, it’s a good idea to trust your senses.

For instance, if a colleague is overly familiar – despite having only engaged with you once or twice – or a company that you don’t recall having any involvement with requests updated information, this should raise a red flag. It’s always a good idea to look for other indicators that such examples could be illegitimate.

Identification is the first step in any cybersecurity strategy, which is why employee awareness of phishing scams is crucial. The chances are, if one member of the team is on the receiving end of a threat, others are too. By reporting suspected fraudulent emails to the incident and security response team  – or your organisational equivalent – employees can enable rapid responses to potential phishing attacks and help mitigate the risks of sabotage.

Falling prey to cybercriminals can be daunting, but with the right knowledge and procedures in place, it’s an avoidable feat that can help protect not only your personal data, but also your reputation, time, and expenses.

For further support on phishing, please don’t hesitate to contact our team. Or if you’re seeking assistance with a wider variety of professional IT services – to help streamline operations and spearhead strategic growth – we’d love to chat about that, too.

You can reach us on 01706 747 474, or by emailing info@centralnetworks.co.uk.

IT'S WHAT WE DO.

Central Networks are a strategic technology partner. Excellent technology is a given, customer service, trust and long-term relationships are what drive our business. We support CEOs, Heads of IT, IT technicians and transformation directors to ensure technology provides an edge to their organisations.

© Central Networks & Technologies Ltd.
Byron House, Green Lane
Heywood OL10 2DY

T: +44 (0)1706 747474
E: info@centralnetworks.co.uk

Company No: 02604843
VAT: GB 562 6919 13

Privacy Policy
Terms & Conditions