Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

Why Do We Need MFA?

Don’t you hate logging into something, only to have to go to your phone to get a special access code? Or how about going to a website to login, only to have a code texted to your phone. And if you’ve switched phone numbers – well, your problems may just be starting. So why do we use Multi Factor Authentication (MFA)? Is it really worth the hassle? What good does it accomplish? If you’ve ever been frustrated with MFA, then this session is for you.

You Might Also Be Interested In...

a house in a circle that points to other things in circles

Smart Tips to Keep Money From Being Stolen Through Online Banking

There are a lot of things that have changed since the invention of the internet. One of these is how we bank and access our accounts. You used to have to go into a local bank branch to make deposits and withdrawals. Now, you can take a picture of a check and deposit it from your phone.

A unlocked lock with a hand stealing the username and password

What Is Push-Bombing & How Can You Prevent It?

Cloud account takeover has become a major problem for organizations. Think about how much work your company does that requires a username and password. Employees end up having to log into many different systems or cloud apps.

A Lock Sitting on a labtop

Insider Threats Are Getting More Dangerous! Here's How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Preparing for Insider Threats

November 14, 10:30 AM


No one likes to think that someone in the organization might intentionally destroy data or leak information. Yet data shows over 1/3 of data breaches are caused by insider threats. How do you plan and prepare for this type of risk?