macy

/Macy Brink

About Macy Brink

This author has not yet filled in any details.
So far Macy Brink has created 52 blog entries.

#1 Frustration About IT- and How Our Service Coordinator Works to Resolve It

Picture this- you walk into work on a Monday morning and start getting settled for the week. You go to log into your computer and your password needs to be reset. You call your IT guy- voicemail. After waiting an hour with no response, you call again- voicemail. You try again for a third time, [...]

December 10th, 2019|Categories: Employee Interview, IT provider, Partner, People|Tags: , , |

SMBs are Officially a Top Target For Cyber Attacks

For some time there have been many misconceptions and controversies regarding the risk small and mid-sized businesses are at for cyber attacks. SMBs have often theorized that they are at less risk of falling victim to attacks than large businesses due to being less “in the spotlight," containing a smaller amount of content and data, [...]

Top 10 Tips to Avoid Cyber Attacks This Black Friday Weekend

Are you planning to get some of your holiday shopping done online this year? If so, you are amongst 75% of Americans who will complete at least half of their holiday shopping online. If you’re planning to get your online shopping done over the Black Friday and Cyber Monday weekend, read this important information to [...]

November 26th, 2019|Categories: Cyber Secure, Cybersecurity, People|Tags: , |

Top 2 Reasons to Implement CIS Control 12

It’s far too easy to unintentionally skip out on implementing key CIS Controls. When unaware of the ways in which these controls can add layers to your security people lack prioritizing the implementation of these controls. CIS Control 12- Detects, prevents, and corrects the flow of information transferring networks of different trust levels with a [...]

November 19th, 2019|Categories: CIS Controls, Cybersecurity|Tags: |

5 Things You Should Know About Healthcare Cybersecurity

Healthcare is, and continues to be, a top target for cyber attacks. And statistics show that won’t be changing any time soon. Cyber criminals are after information they can use and the fact of the matter is, medical files contain the very information the criminals are after. The amount of exploitable financial and personal data [...]

November 12th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity, Healthcare|Tags: , , |

Weakest Link in Your Cybersecurity

It is easy to assume that cybercriminals would target newer or mid-level employees when targeting a SMB. But this has recently been found false. A SMB company leader is your weakest link when it comes to your security and in terms of who the criminals are after. Why? The answer is simple. Because of the [...]

November 5th, 2019|Categories: Cyber Secure, Privacy, Security, Security Awareness Training, Small Businesses|Tags: , |

TOP 5 Lessons for Better Security!

Are you constantly told how important your security is on the internet?  Do you fear that although you know the importance of cybersecurity, you do not fully understand the extent of what how to be secure? In a recent article written by BizTech Magazine, they shared 5 tips to better online security. We at The [...]

October 29th, 2019|Categories: Cyber Secure, Cybersecurity|Tags: , , |

Let Chris Kenimer Help End Your IT Frustrations

Meet Chris Kenimer- one of The IT Company’s newest team member dedicated to ending your IT frustrations! Chris recently moved to Knoxville from South Florida where he had several years of experience as an on-site IT Director for an Urgent Care facility. In preparation to move to Knoxville to be near family, Chris began looking [...]

October 22nd, 2019|Categories: Employee Interview, IT provider, People|Tags: , , |

LATEST Method of Phishing Attacks

What if we told you that cybercriminals are now developing methods to steal your information without leaving a trace back to them? Unfortunately, this is a reality that we all need to be aware of. The latest form of cyberattacks are more dangerous than ever, for this exact reason. Referred to by experts’ as “Heatstroke,” [...]

#1 Password Defense Against Cybercriminals

In a world where the secret network is vastly and rapidly growing, what is your top password defense against cybercriminals? It may sound simple, but there is extreme power and control and in the simplicity of password safety. One of user’s top means of protection is in frequently changing their passwords and using different passwords [...]

October 8th, 2019|Categories: Cyber Secure, Cyberattack, Data Breach, Privacy, Security|Tags: , |