Get in touch

    I agree to the
    terms & conditions

    We are passionate about security. Passwords are currently an important part of everyday life, but slowly they are fading into the history books. When King Password dies, who is the heir? Read on to find out.

    Passwords are passing; their time is slowly coming to an end. Their existence has persisted for year upon year, almost becoming an expected aspect of everyday life. There is rarely a day where you don’t use your password: whether you are logging into your emails or social media, it is almost muscle memory when you are plugging those special characters into your keyboard.

    Passwords can be emotionally semantic… or maybe not. Most passwords, according to a 2016 KeeperSecurity study, are comprised of pet names, hometowns, childhood memories or someone special’s birthday, making passwords an extension of one’s personality. However, perhaps you are not attached to yours like some are. Perhaps your password is a carefully calculated string of nonsense, complexed and more secure than something that can be guessed by taking a quick look at your Facebook page. Either way, your password is still your password.

    Well unfortunately for the semantic bunch, online security is getting ever-more sophisticated and passwords are on their way out. Seriously. Bill Gates stated at the RSA conference in 2004 that “people are going to rely less and less on passwords” as “they just don’t meet the challenge for anything you really want to secure”. Looking at how innovatory hackers have become, it’s clear Gates was right. Hacking has plagued our internet for as long as it has existed. It seems as if it’s only getting worse. From Ransomware like WannaCry and CryptoLocker to simple password cracking algorithms such as Aircrack-ng, businesses and people’s personal lives are at the crux of a world-wide epidemic that doesn’t seem to be slowing down.

    If passwords aren’t the solution anymore, what is?


    1: Two-step verification

    Already adopted by the likes of Google and Microsoft, two-step verification provides users with an extra layer of security, rather than replacing passwords altogether. Consider it a ‘double check’, just to verify that it is you who is trying to login. It works like this: you type your password in, and the service will send you a push notification on a personal mobile device to confirm your login. This works because if someone has your password and is trying to login to your account, they are unlikely to also have your mobile phone in their pocket too. Right?

    Two-step verification has been used by banks for online banking for years in the form of a Secure Key card or a Card Reader, but it’s only been hitting regular accounts like email and social media in recent years.

    2: Fingerprints

    In 2013, the iPhone 5s was released: the first mobile phone with a fingerprint scanner for secure login. Since 2013, almost every brand has released a mobile device with a fingerprint scanner, ranging from mobile phones to even laptops and computers.

    Not many people, however, understand the differences between the two main types of finger print scanner: optical and capacitiveOptical readers obtain a digital depiction of our fingerprints using light sensitive diodes that navigate the peaks and troughs of the finger. This information is stored and must be replicated when the device is trying to be accessed. Capacitive, the more secure version of the two, uses an electric current to identify and analyse the biology of one’s finger, and stores the information similarly to the optical variant. The electrical current varies depending on the image of our finger. The image the electrical current provides is more specific that an optical resolution.

    Unless the hacker has somehow obtained your finger, they are unlikely to be able to access your devices and accounts using this method.

    3: Facial Recognition (Biometrics)

    At one point in time this technology was only ever seen in spy movies: iris recognition and physical feature identification. The only phone on the market (as of 04/09/2017) with this technology, the Lumia 950, uses Windows Hello to incorporate this security measure. The front facing camera opens and recognises the users eye using infrared light and matches it based on a stored image that the user activates when they first set up their device. Eventually, this along with fingerprint scanning could be combined to create the ultimate two-step verification process; a fingerprint and an image of your iris!

    Although not implemented into everyday life yet, it can be expected that iris and fingerprint recognition will be used to access simple accounts such as your emails and social media instead of passwords. Very secure!

    4: Heart Rate

    What? Heart rate? Yes, you read that right.

    A heart rate security system is based on an individual’s heart beat and uses the recorded data as an authentication system. Although like fingerprint scanners, there is one huge benefit to this style of authentication security. You do not need to touch anything. No need to touch a fingerprint scanner, type on a keyboard, pick up a phone… the list could go on. Why? Heart rates can be detected under the radar, completely behind the scenes, using bands such as the Nymi Band.

    It works like this. Everyone’s heartbeat is completely different. It doesn’t just come down to heartrate. The size of the heart, the positions of the valves, the exact shape of the heart all influence the exact type of beat that occurs. Collecting this data in the form of electrical signals, like in an electrocardiogram allows completely unique authentication that is near impossible to replicate.

    Again, it’s very unlikely that the hacker will have access to your heart – by that point I doubt you would really care whether or not they get into your accounts or not.

    5: Single and temporary passwords

    Single and temporary passwords are random number generated (RNG) codes that give access to accounts for a short period of time.

    This method has been deployed mainly in password recovery systems. The user will specify a mobile number for their account and when they request to change their password an SMS message will be sent with a login code to change it. The benefits of this remove the need to go through extra security questions such as “who was your first employer” or “what was the name of your first pet”.

    Other forms of this system are used as a primary login strategy. An example would be Yahoo!’s temporary code system that is used every time a user logs in.

    Additionally, the use of this system can be seen in verification processes, for example within Steam Guard. Steam Guard is a security measure put in place by Valve Corporation to protect Steam users from video game trading scams. Whenever a user wishes to trade an inventory item, or logs in on a new device, a push notification lasting 30 seconds including a RNG based code will be sent to their mobile app to confirm the process of trade or log in. If the user misses the code, a new code will have to be generated and the old one will not work.




    ” I would like to take this opportunity to thank you for all the prompt assistance you provided us with during this project.

    Could you kindly express our gratitude to your engineers for the excellent work they carried out for us. “

    Farhad | London Borough of Hounslow


    ” Being responsible for IT in an organisation which is very tech dependant is a real challenge, especially having no formal IT experience myself.  Having the Nouveau team at the end of the phone is a real-life saver and I have needed a life line many times.  I most appreciate the accessibility, knowledge and friendliness of the team. “

    Judith Ball | CFO | Aspen Worldwide


    Euronics Logo
    ” The company I work for has been using Nouveau Solutions for the past 15+ years and I have had the pleasure myself to build up a good, close relationship with them for about 12 of those years.

    Nouveau Solutions have dedicated teams for each different area that are made up of very knowledgeable technicians and engineers that specialise in their specific area of expertise. It is due to this that I always feel confident that Nouveau Solutions will be able to deliver us any IT services that we may request from them (there has been a lot over the years).

    They have always gone above and beyond to deliver high quality professional IT services to meet any requirements that we throw at them within any timeframes that we may set.

    On top of the ad-hoc IT services we request from Nouveau Solutions, they also monitor, manage, maintain and support some of our network infrastructure and have always been on hand to resolve any issues that may be noticed via their monitoring or raised by us within a timely manner.

    We also purchase the majority of our IT equipment including hardware, software and licensing through Nouveau Solutions which is always at a reasonable price and always received within a timely manner.

    Since day one of our relationship with Nouveau Solutions we have been appointed to the same one account manager which has allowed him to get to know our business very well. The service that has been provided by him to us has been nothing but exceptional. He always comes across as knowledgeable in any business discussions that we may have and has always been happy to take the time to communicate with us, make us aware of anything that we need to be aware of, or provide us with updates on anything.  I have always had the impression that his main priority is to ensure that we are happy with everything that Nouveau Solutions provides to us and he will do anything to ensure that is the case.

    All in all, I have nothing but praise to offer for Nouveau Solutions and would highly recommend them to any company that was looking for an IT services company.  There are definitely no plans here to switch to a different IT services company for the foreseeable future.

    Here’s to many more years with using Nouveau Solutions! “

    Lee Burgess | IT Systems Administrator | Combined Independents (Holdings) Ltd


    ” Nouveau have been brilliant from start to finish – very professional and competitive with their service and pricing. We needed a large number of Firewalls to deploy across our global company over a very short time period and thanks to Jack’s excellent availability, Nouveau’s turn-around time was extremely swift, even with nearly no notice. Nouveau not only provided us with the hardware  – one of their competent technicians supplied us with some design work in the past to help with our data centre firewalls replacement project! Nouveau have been great to work with. “

    Hassan Ashraf | IT Service and Infrastructure Manager | Everlight Radiology


    ” In the summer of 2017, I approached Nouveau in the hope of finding a competent partner that could help us through an upcoming hardware refresh. A priority of ours was to discover a local business (within 20 miles) that excelled and specialised in HPE, Dell, Fortinet and Microsoft/Office 365 as we planned to refresh our whole core infrastructure,. This included storage, infrastructure hosting and networking (core, access and perimeter) for our headquarters and our other branches. After an extensive phase of speccing, detail planning and quoting, Andy Swain and his team were able to offer a “spot on” solution for our demands with a very high cost/value ratio. This project led to a very open and trusting partnership with Nouveau and made them our No.1 partner within IT. “

    Stefan Nader | Ensilica