Presented by

Logo for Custom Internet Services LLC

Why Do We Need MFA?

Don’t you hate logging into something, only to have to go to your phone to get a special access code? Or how about going to a website to login, only to have a code texted to your phone. And if you’ve switched phone numbers – well, your problems may just be starting. So why do we use Multi Factor Authentication (MFA)? Is it really worth the hassle? What good does it accomplish? If you’ve ever been frustrated with MFA, then this session is for you.

Post-Webinar Survey

Help us improve our webinar offerings by taking this short, post-webinar survey.

Webinar Survey: Lost Laptops & Stolen Cells
7

How comfortable were you with this topic BEFORE attending this webinar?*

How comfortable were you with this topic AFTER attending this webinar?*

What do you plan to do differently after attending this webinar?*

Do you have any additional questions about this topic?*

Please enter your question(s) here:

Do you have any suggestions for future webinar topics?

Is there anything else you would like us to know about this webinar?

Let's stay in touch!
3

How did you learn about this webinar?*

Would you like to receive emails about future webinars from Practical Cybersecurity?*

Please sign me up for emails from Practical Cybersecurity

Contact Information (Optional)
If you would like us to respond to your questions submitted through this survey, please share your name and email and we will be in touch. Information provided in this section will be used only to follow-up regarding questions you may have submitted. We will not use this information for marketing purposes.
2

Name

Email

You Might Also Be Interested In...

Line drawing of a hand holding a smart phone displaying a six-digit MFA code. Text reads, "A Small Business Guide to Implementing Multi-Factor Authentication (MFA)"

A Small Business Guide to Implementing Multi-Factor Authentication (MFA)

What is MFA? MFA (Multi-Factor Authentication) is one of the most effective steps you can take to protect your business from cyber threats.

The word "Password" and password field overlaid on a hand typing on a keyboard. Text reads, "Complete Guide to Strong Passwords and Authentication"

Complete Guide to Strong Passwords and Authentication

This guide talks about the basics of strong passwords, two-factor authentication, and the best ways to create a secure login.

a lock with chains on it. Text reads, "Simple Guide to Follow For Better Endpoint Protection"

Simple Guide to Follow for Better Endpoint Protection

In this guide, we’ll provide you with straightforward solutions focused on protection of endpoint devices including enabling two-step verification for a secure sign in, updating security solutions, and applying security policies.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

There is no Event