macy

/Macy Brink

About Macy Brink

This author has not yet filled in any details.
So far Macy Brink has created 10 blog entries.

Protect Yourself Against Data Breaches

Are you concerned about your online security? If you’re not, you should be. Recent news has shared that earlier this month, security experts discovered the largest collection of stolen account credentials, ever. They then found that this overwhelmingly large collection of information pulled from both old and new data breaches, is just one of seven collections [...]

February 19th, 2019|Categories: Data Breach, Security|Tags: , , , , |

Tips to Protecting Your Business and Family From Cyber Crimes

In an attempt to help people truly understand how they can protect their businesses and their family, Scott Augenbaum has written the book The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business From Cybercrime. And in a recent article, people are claiming that this book has the potential to “save your [...]

February 12th, 2019|Categories: Cyberattack, Cybersecurity, Security|Tags: , , , |

Why it is Critical to Back Up Office 365

Office 365 can be a powerful and productive collaborative tool- which is why it absolutely critical to back it up! A few weeks ago The IT Company blog series talked to readers about how Office 365 is replacing traditional file servers. Because of the lack of growth file servers and the methods of accessing them [...]

February 5th, 2019|Categories: Office 365, Security|Tags: , , , , |

Security Awareness Training for Kids

Kids are the most vulnerable online population and the most likely to be unaware of the potential online dangers. Security awareness is not only vital to adults, but to  anyone who has access to device. The IT Company’s partner KnowBe4 is now offering a children’s cybersecurity activity kit to the public- and there’s no cost! [...]

February 1st, 2019|Categories: KnowBe4, Security Awareness Training|Tags: , , , , |

ALERT: FaceTime Bug

We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In some cases it has been reported that video can be seen as well. Apple is working [...]

January 29th, 2019|Categories: Privacy, Security|Tags: , , , , |

Employee Interview- Macy Brink

Macy Brink here! Each week I have the opportunity to produce The IT Company’s blog. Part of my role at The IT Company is devoting time to interviewing customers, partners, and employees, researching and gaining knowledge on current technology topics, and seeking to have constant awareness of any news about important security alerts. Often putting [...]

January 29th, 2019|Categories: Employee Interview, People|Tags: , , |

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

Ransomware Attacks on Healthcare

Healthcare organizations have been a large target for cyber criminals for many years. Recent studies are showing that while healthcare organizations continue to be a target for attacks, there is a downward trend in the number of attacks on the healthcare industry. This trend is seemingly positive news, but healthcare organizations (of all sizes) should [...]

January 16th, 2019|Categories: Cyber Secure, Healthcare|Tags: , , |

2019 and Beyond

It's hard to believe it's 2019, and another year in the 21st century came and went. 2018 was like a blur, especially in the world of technology. The pace at which innovation and change is happening continues to accelerate, which creates opportunities and challenges. I feel like as I grow older, I begin to realize [...]

January 15th, 2019|Categories: People, Small Businesses, Technology|Tags: , , , |

2-Factor Authentication Vulnerability

Do you count on 2-factor authentication to be the tool that secures your accounts? Recent news has informed users that this extra layer of security many users have implemented, can be vulnerable. Kevin Mitnick, the chief hacking officer at KnowBe4 shares his expertise and concern with the exposure of this recent vulnerability. Like many cyberattacks, it [...]

January 7th, 2019|Categories: 2-Factor Authentication, Security|Tags: , , |