Presented by

Logo for Custom Internet Services LLC

Why Do We Need MFA?

Don’t you hate logging into something, only to have to go to your phone to get a special access code? Or how about going to a website to login, only to have a code texted to your phone. And if you’ve switched phone numbers – well, your problems may just be starting. So why do we use Multi Factor Authentication (MFA)? Is it really worth the hassle? What good does it accomplish? If you’ve ever been frustrated with MFA, then this session is for you.

You Might Also Be Interested In...

Line drawing of a hand holding a smart phone displaying a six-digit MFA code. Text reads, "A Small Business Guide to Implementing Multi-Factor Authentication (MFA)"

A Small Business Guide to Implementing Multi-Factor Authentication (MFA)

What is MFA? MFA (Multi-Factor Authentication) is one of the most effective steps you can take to protect your business from cyber threats.

The word "Password" and password field overlaid on a hand typing on a keyboard. Text reads, "Complete Guide to Strong Passwords and Authentication"

Complete Guide to Strong Passwords and Authentication

This guide talks about the basics of strong passwords, two-factor authentication, and the best ways to create a secure login.

a lock with chains on it. Text reads, "Simple Guide to Follow For Better Endpoint Protection"

Simple Guide to Follow for Better Endpoint Protection

In this guide, we’ll provide you with straightforward solutions focused on protection of endpoint devices including enabling two-step verification for a secure sign in, updating security solutions, and applying security policies.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

11 September 2025
10:30 AM - 11:00 AM
Virtual,

We’ve all heard the saying, “Together we stand; divided we fall”, and that’s also applies to network security. Creating a work culture where security matters will only strengthen your efforts […]

Free