Are You Ready For The Internet Of Things [Recorded October 2016]

 

It is estimated there are already 6.4 billion devices as a part of the Internet of Things (IoT) and there will 25 billion by 2020. Businesses, governments and home users are all quickly adopting these devices to be
shared across the Internet.  We now can monitor an aging family member, remotely feed a pet, view live traffic conditions, monitor crops, observe buying habits and countless new exciting ways to help our businesses and lives with IoT.

How does IoT work? What are the business opportunities and what should our concerns be with embracing this new class of computing devices? 


Watch our recorded webinar to get caught up!


The Democratic National Committee (DNC) and countless other organizations are cyber targets. A data breach can have a major effect on your business – loss of customers, reduced brand reputation,
significant financial impact and more. If you think your business is too small to be an attractive target for cyber criminals or you don’t have anything worth stealing, think again.

Watch our recorded webinar to get caught up!


Do You Really Need Two-Factor Authentication?

The most common security method used to access your accounts online is with an email address and a password.  You use these steps every day in some way with your computer, email, banking, social media and countless
other online locations.  Another layer of protection for authentication that is being commonly added is called Two-Factor Authentication, 2FA, Two-Step Security or Multi-Factor Authentication.

You should be activating this extra layer of authentication with you online accounts. With so much Internet fraud, two-factor authentication is a method which can help keep your online accounts and personal information better protected.

 


How does it work?

Two-factor authentication is a security process in which the user provides two means of unique information from different sources; one is something you may have memorized, like a password, and the other is something
physical, like a security code sent to you in a text message.  Sometimes, this code can be generated and sent to you as an email.

You are already using the password process, and the new piece is the security code generated in the form of text message.  Most of the time, this 2FA process is used only when accessing your account from a new web
browser or computer.  More secure online services will require 2FA at every login, but this is rare.


Which accounts should you use 2FA?

Many financial organizations are already making this mandatory.  Other online accounts, which hold valuable personal information, make it an option, and you may need to turn on: Apple, Google, Facebook, Comcast,
and bigger brands.  Very few online shopping sites have established any kind of 2FA yet.


How do you set up 2FA?

After you have logged-in to your account, you would go to your personal settings.  Next, you would have to make sure your cell phone number is established in your account information. Then, in security settings,
you would find the option to turn on login authentication from your phone or text message. Each organization is different regarding how it is handled, but once set-up, a text message is sent to your phone as a new step for your log-in process to
access your account.

To learn more about out to keep yourself better protected watch a recording of our recent webinar –
Keeping Your Business Secure Online



here.