> Cybercrime and You
> Your Security Awareness Training
> Essential, Non-Negotiable Tech Tools for Small Business
> What Does Multi-Factor Authentication Actually Mean?
> Peter’s Bucket List Dive Trip to Indonesia
Cybercrime and You
> How data breaches happen
> The personal impact of cybercrime
> The threat in your pocket
Learn more about cybercrime and you, and how to protect yourself. Human error is the root cause of almost all breaches. Regardless of how they happen, breaches impact all of us. On a professional level as well as on a personal level. Help prevent breaches from happening by staying alert, remaining skeptical, reporting security incidents, and always following policy!
Your Security Awareness Training
Akamai has partnered with Breach Secure Now to offer our clients a security awareness training tool; included in our services. Contact us today to learn more!
Essential, Non-Negotiable Tech Tools for Small Businesses
No, we’re not talking hammers and screwdrivers, but the tech tools SMBs need in their toolbox to stay competitive. For example, security tools, cloud-based solutions, scalable bandwidth, and recovery and redundancy tools. And a great tech partner! Details in article.
What Does Multi-Factor Authentication Actually Mean?
Multi-Factor Authentication, or MFA, is a form of authenticating users. It utilizes more than one method of identification when connecting to a secure site or service. MFA provides an additional layer of security over traditional forms of single sign-on authentication, which require only one type of identification such as a password.
Also known as two-factor authentication, or 2FA, multi-factor authentication can take several forms, but most typically utilizes either a smartphone or a smart card in conjunction with a password or PIN. More advanced forms of MFA will sometimes rely on biometrics such as fingerprint recognition or retina scanning for the second form of authentication.
How Multi-Factor Authentication Normally Works
A user logging into a site secured with MFA will typically enter a password and then will have a code sent to the smartphone number (or email address) associated with the account. Only after the correct password and the authentication code have been successfully entered will the user be able to access the site or service.
While not completely foolproof, MFA does make it harder for hackers to log in to a user’s account, as they would need to have both the user’s password and access to their smartphone or similar device in order to correctly provide both forms of authentication.
Peter’s Bucket List Dive Trip to Indonesia
Did you know that Peter is an Advanced PADI certified scuba diver? After completing his first certification dive in Borneo, Malaysia in 2011, he has completed 90+ dives to date in places such as Thailand, Colombia, Mexico, Hawaii, Belize, Bonaire, Puerto Rico and more!
He has inspired his whole family to get certified, and dive trips are built into family travel whenever possible.
In February this year, Peter completed a bucket list dive trip with his son Markus to Raja Ampat and Misool Indonesia. They did a 10-day live-aboard dive trip and experienced one of the best reef life and fish habitats in the world coupled with mantas and sharks!