Using 2FA/MFA can Save Your Bacon

After several years of being in use there are still many people mystified as to what 2FA or MFA is and what function it performs. Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is a security protocol that is used to verify and validate the person requesting access to their network. […]

Read More… from Using 2FA/MFA can Save Your Bacon

Password Security

Forensic cyber experts have stated that over 70% of breaches that occur are the result of poor passwords or people using multiple accounts with the same passwords. More than two thirds, a year after the initial breach, still use the same passwords! To say this is poor computer security is an understatement. Cyber criminals like […]

Read More… from Password Security

Why a Multi-Layered Approach is the Best Defense in Cybersecurity

When it comes to cybersecurity protection many companies claim to be the end all be all for protection. But at the end of the day the truth is that they ALL are. What does this mean, I’ll explain? Let’s start by going back in time and revisit what cybersecurity meant years ago before the cybersecurity […]

Read More… from Why a Multi-Layered Approach is the Best Defense in Cybersecurity

How Cyber Team U.S. Chose it’s Lineup of Tools

We’ve been asked by many people how did Cyber Team U.S. choose the cybersecurity products and tools for its lineup. It’s a long story so I’ll see if I can condense it. Cyber Team U.S. is run by former military and professional cyber security experts. They have taken their skillsets learned in the military, government, […]

Read More… from How Cyber Team U.S. Chose it’s Lineup of Tools