illume login changes

Changes to illume login

We’re updating the Lightwire login flow to improve security and improve your experience while using the suite of Lightwire tools that can be found inside the partner portal, illume.

What's changing?

Logging into illume is now handled through the id.lightwire.co domain. Here’s what the login screen will look like in the new login flow (nothing ground breaking, I know). You can see the real changes once you’re logged in. 

New illume login flow

Once logged into illume, you can opt to change your contact details, password, manage browser sessions and/or log out other browser sessions, and set up two factor authentication.

Contact details

Why are we implementing these changes?

The threat posed by cyber attacks is real. While we can’t completely prevent cyber attacks, we can mitigate the risk of one.

Passwords can be weak or reused across multiple accounts. They can also be stolen in a phishing or malware attack. The two factor authentication can prevent these incidents as an attacker would also need ‘something you have’ or ‘something you are’ to get access to the account.

Session management is another feature that enhances your security by allowing you to see details of current logged in sessions and enabling you to log out any other browser sessions.

Recent Posts

3CX Small Business – Multi-Tenant

For small businesses, 3CX SMB is the smart choice – a fully-managed, cost-effective PBX that covers all the essentials like voicemail, call queues, and digital receptionists. Perfect for teams of up to 10 users who don’t need advanced features or deep integrations.

Read More »

Lightwire Threat Feed Service

Under our new Lightwire Threat Feed Service (LTFS), we’ve kicked off by adding two key services from the National Cyber Security Centre (NCSC); Malware Free Networks (MFN) and the Phishing Disruption Service (PDS).

Read More »

Pulse Detect – Public Port Scanning

Pulse Detect provides clear visibility into publicly available vulnerability data associated with your infrastructure — including open ports and known Common Vulnerabilities and Exposures (CVEs) linked to your public IPs. This is the same type of information cyber adversaries actively seek out.

Read More »

Listen to the podcast