Mobile Menu icon

Whatever you need we've got IT covered.

Our highly experienced support team are capable of handling any IT support issue, so you can relax and concentrate on making your business a success.

In the event of any problems, our standard support hours are 9am-5.30pm, Monday-Thursday, and until 5.00pm on Friday. We offer an extended hours contract whereby the support hours become 8am-6pm, Monday-Friday. If you need a quick solution to a technical problem, then our live remote-assistance tool can help. A member of our dedicated support team can liaise directly with you to find the answer to your question.

Step One - Call 0844 800 4456



Support Form

If you are in need of support please fill in the form below or call us on 0844 800 4456


Contact Us

London Office:

Main number: 020 3507 1920

Sales number: 020 3507 1922

Technical support: 0844 800 4456

Essex Office:

Main number: 01268 494 100

Sales number: 01268 494 160

Technical support: 0844 800 4456



Network login authenticated - it's in your veins!

Barclays has revealed what it says is the future of fraud prevention in corporate banking with the Barclays Biometric Reader, a Hitachi-developed tool that uses "vein authentication technology" to ensure secure customer authentication for corporate transactions. Barclays are looking to roll out the technology to their corporate clients in 2015.

Biometric authentication, such as retina and fingerprint scanning and voice recognition, holds a lot of promise for identity and access management. Another interesting example being trailed by the Australian Tax Office is voice authentication. To date some 30,000 voice impressions have been amassed.

These are exciting developments but are not going to be available for some time and the more sophisticated the solution, the less likely SMEs will be able to afford the investment necessary. In the meantime, there are a number of two factor authentication (2FA) solutions that are affordable and available, and more SMEs are gaining comfort from knowing who is accessing their network, applications and data.

One straight forward example, is a token generating system where the login process is supplemented by a further stage requiring a number generated at the moment of login to be entered. The token number is generated by an algorithm installed either a calculator style device or as an app on a mobile phone.

The investment required is not great and can be applied to specific users or all users, remote and in-house users, and/or specific applications and even those hosted in the Cloud. The protection these simple systems provide helps to guard against passwords being hacked by web based robot programs, and ensures that the correct user is accessing the system.

For more information about adding greater security to your network, contact Maria West on 01268 494101 or email

Yellowspring is a IT consultancy providing advice, support and project deployment for London, Essex, Hertfordshire, Kent and surrounding counties.


Latest News

The humble USB has been banned in the offices of IBM - does your business

Read more

You have worked hard to build your mailing list but GDPR could threaten it if

Read more

We explore how the financial industry will be affected when the new data protection law

Read more