Videos
Short videos highlighting techniques for combining MFA, password management, and IT centralized control.
Episode 1 – When Does Cyber Security Start?
So many organizations and IT departments focus their Enterprise Cybersecurity efforts behind their firewall. While important, they often ignore locking the virtual front door.
Passwords are a secure part of the Authentication and a key Multi-Factor component. We don’t need to Kill Passwords, we need to Secure Passwords. (2:27 min)
Episode 2 – Cyber Security’s Titanic Peril
Secure computer boot up and log in is important for cyber security. But, what about logging OFF the computer? An unattended, connected computer becomes the hacker’s backdoor, giving them Remote Access into the company’s apps, files, and information.
When evaluating computer authentication and cybersecurity processes, don’t ignore secure logoff. (2:25 min)
Episode 3 – The Hard Truths about Passwords
The Hard Truth about Passwords is that cyber security best practices for passwords look great on paper, but they surrender network privacy and data protection to cybersecurity’s weakest link.
Poorly implemented password policies and procedures create a false sense of security by creating a weak link in the cyber security chain. (2:34 min)
Episode 4 – You Make Passwords Secure By…
Passwords are Secure. Wow, that’s not a statement you hear often in cybersecurity. However, it’s true. What is not secure is how they are typically managed. A password manager alone is not the answer, and many of those phone authentication apps are cumbersome and give a false sense of security.
Password hygiene is required for both the work office and the home office. (2:00 min)
Episode 5 – Quickly Improve Password Authentication
Cybersecurity requires IT Administrators to implement secure authentication before allowing network access. However, high costs and uncertainty often delay implementations. Plus, many multi-factor authentication solutions get discarded due to their complexity for both the employee and the IT manager. Not anymore.
Power LogOn combines MFA with a secure password manager to deliver security, compliance, convenience, and affordability. (2:39 min)
Episode 6 – Convenience Cybersecurity’s Forgotten Protection
Most cybersecurity fundamentals revolve around firewalls, encryptions, software, and other technologies. However, there is more to network security assessments than technology.
Never ignore the human element. One of the most crucial elements is convenience. Convenience determines if the security technology will be implemented or pushed aside by the employees, IT, and management. (2:52 min)
Episode 7 – Show Me the Money… for Cybersecurity
It’s time to shut the front door about cyber tech and start showing me the money. The majority of cybersecurity manufacturers, resellers and IT Administrators concentrate on the technology, with the belief that The Suits (CEO/CFO) understand their CISO’s world.
Now it’s time for the CISO and IT administrators to understand how to communicate with the business side. (3:05 min)
Episode 8 – Multi-Factor Authentication: The Facts
Do you know the difference between Two-Step Verification and Multi-Factor Authentication (MFA) required for cybersecurity? If not, you really need to watch his video.
The difference can cost you your government contracts, make you overpay for cybersecurity, or even get you hacked.
Watch now to understand this important distinction. (3:41 min)
Episode 9 – Secure Offline OT
Operational Technology (OT) must be offline and secure, says the NSA! Cybersecurity starts at bootup login authentication.
Secure offline OT systems using MFA, Digital Certificates, and password authentication. Works for both commercial and government systems. (3:13 min)