Protect Your Business’ Email & Software Application with MFA

Duo Multi Factor Authentications (MFA) provides an additional level of protection for your email and software applications by asking users to confirm their identity after logging in, usually with their mobile phone. This prevents lost passwords or hacked accounts being able to access you corporate data with a single, easy to use solution.

Request A Duo 2FA Quote

— Request A Free Quote —

After a discussion about your business, we’ll analyse your existing set up and recommended the correct Duo Two Factor Authentication package to meet the needs of your organisation.

Request Your Quote Main

Why is Two Factor, or Multi Factor, Authentication So Important?

One of the most common forms of cyber attack is something known as “credential harvesting”. This attack targets users by attempting to trick them into giving away their usernames and passwords on what appear to be genuine websites. If a users gives away these details they can often to be used to access accounts to cause harm (normally financially) or to distribute further credential harvesting attacks on contacts from within that account.

Two Factor and Multi Factor Authentication prevent this attack as users must approve any login, usually via a smart phone or token device. Without this approval hackers cannot access the account, even if they have the correct username and password.

At The HBP Group we provide Duo MFA to protect email, devices and applications from these type of attacks.


Easy, Effective and Secure

Duo integrates to protect every point of access, from on-premises, to web-based, to cloud-based applications. Deployment is quick and easy, and the platform’s user-friendly authentication experience and intuitive administrator dashboard make managing your security protocols a breeze.

Request A Quote >
Close up of a laptop using duel authentication to log in

Zero Trust Made Simple

Duo puts your organisation on the fast-track to zero trust by securing the modern workforce. The simple, all-in-one platform lets you verify user identities, assess and act on the health of devices, set adaptive access policies, and protect users’ productivity with modern remote access and SSO capabilities.

Request A Quote >
Someone using mobile duel factor authentication

2FA For Every Business

At Duo, we believe every organisation should have a 2FA solution, so we take pride in providing a simple, yet scalable, security platform that works. With three editions and a host of capabilities built in, you can choose the solution that’s just perfect for your business. See editions and pricing here.

Request A Quote >

Advice VideoHow To Implement Two Factor Authentication

In this video, recorded on 04/3/2021, our commercial director Phil Denham interviews Tony Pearson, Daniel Palmer and Darren Jacklin from The HBP Group IT Support Team about the objections to implementing two factor within a business and how to roll it out successfully

See Full Blog Post

Two factor and multi factor authentication solutions are small solutions which provide huge benefits.

What are the Factors of Authentication?

Factors are the pieces of information a user can provide to verify their identity. 2FA is the most commonly used, but there are, in fact, five factors of authentication used by security professionals today.

Knowledge Factor
The knowledge factor verifies identity by requesting information only an individual user would know. The most common example of a knowledge factor of authentication is a password. A user’s password should be private only to them, allowing them to use it as a method to confirm their identity.

Possession Factor
Possession factors verify the identity of a user by requiring proof of information that only the user should possess. Tokens are a commonly used possession factor of authentication. These tokens generate a rotating passcode that users must physically carry on their person.

Duo Mobile combines the knowledge factor and possession factor of authentication to create the world’s most trusted 2FA platform. Two other possession factors of authentication are HMAC-based One-Time Password (HOTP) and Time-based One-time Password (TOTP). Both authentication methods generate temporary passwords from a physical device carried by the user. HOTP tokens expire once they are used while TOTP tokens expire if not used within thirty seconds.

Inherence Factor
Inherence factors of authentication verify the identity of a user by using attributes that would belong only to that user. Fingerprint scanning is the most obvious inherence factor used today.

Fingerprints are unique to individuals, so many organizations use them as a way to confirm who their users are. In addition to fingerprints, there are many other inherence factors used today: voice, handprints, face recognition, and more.

Location Factor
Location factors of authentication confirm the identity of a user based on their location in the world. If a user had registered an account in one country, for example, and suddenly there are login attempts from another, location factors could trigger and attempt to verify the identity of the new user. Many location factors are based on the IP address of the original user and compares the address to that of the new attempt to access information.

Time Factor
Time factors of authentication verify the identity of a user by challenging the time of the access attempt. This is based on the assumption that certain behaviors (like logging into a work computer) should happen within predictable time ranges. If an attempt to access a platform happens outside of the usual time range, the attempt can be challenged or terminated until a user can verify their identity.

The HBP GroupWho Are We?

Our organisation consists of three businesses; HBP Systems Ltd. Kamarin Computers Ltd and Jugo Systems. HBP are based in Lincolnshire, Kamarin in Cambridgeshire and Jugo in Hampshire. Between us we cover the vast majority of the UK and work under The HBP Group name to provide a seamless service between our northern and southern offices.

About Us

We specialise in providing IT solutions and support to businesses to ensure they use technology effectively and efficiently and can focus on what they do best – running their business.

The HBP Group Structure showing HBP Systems, Kamarin Computers and Jugo Systems
Contact 0800 0433 106