Practical Cybersecurity Logo - returns to homepage

Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

Why Do We Need MFA?

Don’t you hate logging into something, only to have to go to your phone to get a special access code? Or how about going to a website to login, only to have a code texted to your phone. And if you’ve switched phone numbers – well, your problems may just be starting. So why do we use Multi Factor Authentication (MFA)? Is it really worth the hassle? What good does it accomplish? If you’ve ever been frustrated with MFA, then this session is for you.

You Might Also Be Interested In...

a house in a circle that points to other things in circles

Smart Tips to Keep Money From Being Stolen Through Online Banking

There are a lot of things that have changed since the invention of the internet. One of these is how we bank and access our accounts. You used to have to go into a local bank branch to make deposits and withdrawals. Now, you can take a picture of a check and deposit it from your phone.

A unlocked lock with a hand stealing the username and password

What Is Push-Bombing & How Can You Prevent It?

Cloud account takeover has become a major problem for organizations. Think about how much work your company does that requires a username and password. Employees end up having to log into many different systems or cloud apps.

A Lock Sitting on a labtop

Insider Threats Are Getting More Dangerous! Here's How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

What Does Cyber Insurance Expect of Me?

August 8, 10:30 AM


Cyber insurance almost seems like this black hole that is mysterious to understand. Yet if we’re victims of a cyber incident – something like ransomware, social engineering, business email compromise, etc – we’re going to want that insurance to pay off. So what can we do to enhance the likelihood that cyber insurance will pay when needed? What does my cyber insurance policy expect of me? That’s what we’re going to explore in this fast paced session.