After concerns over the security process for its remote workers and a need to be more efficient, Chorley Council has implemented a new system from SecurEnvoy to provide staff with a reliable and safe way to log on to their corporate network to access systems when working out of the office or on the move.
Chorley Council’s previous system relied on physical hardware tokens that resulted in employees misplacing them or even leaving them with laptops, creating high risk of data loss. SecurEnvoy will provide the council with a two factor authentication ((2FA)) solution that turns users’ mobile phones into authentication devices by using mobile app or SMS technology. The technology provides a one-time pass code that allows users to log on to their work system remotely and securely, either on their laptops or other mobile devices.
Chorley Council has been using hardware token based authentication for seven years but due to the high costs and security risks, needed to review the system and look into more modern alternatives. Now employees can access the company system remotely and securely via an app on their mobile phone, making the requirement for hardware tokens redundant, which will save the Council both time and money.
Asim Khan, Head of Customer ICT and Transactional Services at Chorley Council says “We were experiencing increasing problems around the management of hardware tokens as employees were misplacing them and issuing new ones not only incurred a cost for the tokens themselves but also involved extra administrative costs and time, as well as posing a very real security risk. SecurEnvoy’s two factor solution means that the user can now take control and we confidently expect this to ease the burden on the technical staff.”
Khan continues “The system was incredibly easy to roll out and SecurEnvoy had the solution installed in a matter of hours, providing our staff with a flexible way of working almost immediately.”
Steve Watts, co-founder of SecurEnvoy, says: “Many people use (2FA) every day but might not be aware of it; for example, the use of a pin and card at the ATM. The problem, however, is that when you have any form of hardware token it becomes yet another device to look after and to remember to carry around. Most people will protect their mobile devices more than they would a plastic token as it has a far higher monetary and personal value. We are more likely to leave hardware tokens at home, in a drawer and on the desk, but we carry mobiles everywhere, making them the perfect tool for authentication.”