Multifactor Authentication

What is Multifactor Authentication?

Multifactor authentication (MFA) is a security system that requires more than one method of authentication from credentials to verify the user’s identity to gain access to a network. Multifactor authentication combines two or more credentials: what the user knows (password), what the user has (security token) and what the user is (biometric verification). The goal… Read more »


What is 5G, and What Does It Mean for You?

Superfast “fifth generation 5G” mobile Internet could be launched as early as next year in some countries, promising download speeds 10 to 20 times faster than we have now. But what difference will it make to our lives? Will we need new phones? And will it solve the dead zone issue for people in remote… Read more »

cybercime cybercriminals lack of cybersecurity Chicago brokerage will pay a $1.5 million fine

The Lack of Cybersecurity is Costing Businesses Billions

A Chicago-based brokerage will pay a $1.5 million fine for their lack of cybersecurity policies by allowing cybercriminals to breach the firm’s email systems and to withdraw $1 million from a customer’s account. The U.S. Commodities Futures Trading Commission finds that Phillip Capital Inc. failed to disclose a cyber breach to its customers promptly. PCI… Read more »

important financial documents

The Best Ways to Secure Important Financial Documents

When it comes to storing important financial documents, a shoebox under your bed doesn’t cut it. Estate planning documents — such as wills, trusts, living wills, medical directives, and powers of attorney —are essential to you. So where do you keep them safely secured? And what about your digital assets, passwords, and social media accounts?… Read more »

cybersecurity cybercrime Top Ten Cybersecurity Facts and Statistics for 2019

Top Ten Cybersecurity Facts and Statistics for 2019

Cybersecurity threats evolve and so do cybersecurity facts. Cybersecurity is a hot topic of discussion with data breaches, ransomware attacks, crypto-jacking, and threats to your connected devices. They all contribute to new rounds of cybersecurity facts, figures, and statistics. It can be hard to keep up. So, we have broken them down to the top… Read more »

ransomware cybersecurity

Ransomware on the Rise

Ransomware has rapidly emerged as the most visible cybersecurity risk for our nation’s networks, locking up private sector organizations and government agencies alike. And that’s only what we’re seeing – many more infections are going unreported, ransoms are being paid, and the vicious ransomware cycle continues. CISA’s Role as the Nation’s Risk Advisor Helping organizations… Read more »


From the Office of Brian Jackson, “Why You Should Consider a Hosted VoIP Phone System?”

Traditional phone systems sometimes referred to as PBX (Private Branch Exchanges), has come a long way. They have morphed into digital delivery of voice communications and multimedia sessions known as VoIP (Voice over Internet Protocol) networks. If you’re a business still using a VOIP PBX phone system, you’re far from alone. However, industry experts say… Read more »