Ron Cervantes

Ranking 2FA Security Options & General Authentication Options

One of the most important parts of your IT security strategy is protecting your user logins. Users are notorious for adopting bad password habits like storing passwords insecurely and using weak passwords. They also tend to reuse passwords across multiple applications. 77% of all cloud account breaches are due to hacked or compromised passwords. While […]

4 Important Benefits of Having a Firewall That Can “Geofence”

Cybersecurity has come a long way from using an antivirus on a computer and now encompasses needed protections from ransomware, spyware, credential theft, and more. Attacks continue to get all the more sophisticated at the same time that companies are seeing an explosion in mobile and IoT endpoints.