What is Two-Factor Authentication?

What is Two-Factor Authentication?

As cybercrime increases, we all need to be doing more pre-emptive pushback on these activities. One of the weapons in this ongoing battle is two-factor authentication. Just what is it and how can I implement it if I need to? What is it? Two-factor authentication (or...
Just What is a Firewall Anyway?

Just What is a Firewall Anyway?

Your IT partner has just told you your firewall has been breached. What?  There’s been a fire? Was there any damage? In a manner of speaking, you are partly correct.  While there hasn’t been a real fire with flame and soot and smoke, there is an emergency of another...
Protecting Your Inbox

Protecting Your Inbox

These days, companies’ email systems are one of the most vulnerable places from which a cyber attack can come. this post provides some valuable in formation and solutions relating to how to deal with an attack of this type.