macy

/Macy Brink

About Macy Brink

This author has not yet filled in any details.
So far Macy Brink has created 55 blog entries.

Two-Factor Authentication

Today’s blog is a brief highlight on why two Two-Factor Authentication is an important layer in your company’s security. Two-factor authentication is a form of security that not only requires the typical username and password security method, but it with a code that only a specific user has access to. There are different methods to [...]

December 4th, 2018|Categories: Security, Technology|Tags: , , , , |

Marriott Hotel’s Database Hacked!

This morning CNBC published a news release revealing that Marriott’s Starwood Hotel's database has been hacked, compromising the information of 500 million guests. Marriott shared that the data breach is still under investigation and they are unable to give a list of specific hotel locations effected, but they are fairly certain the breach has only [...]

November 30th, 2018|Categories: Fraud, Security|Tags: , , , |

Cyber Criminals Taking Over Email Inboxes Without Phishing Attacks

We’ve warned our readers several times about different types of phishing attacks and the methods cyber criminals are using to steal your information. Today, we alert you that cyber criminals are now taking over email inboxes without phishing attacks. As always, attackers are constantly finding new ways to intrude. While phishing attacks such as email [...]

Major Online Ad Fraud Operation- 3ve

Yesterday the FTC and DHS released a joint alert on a major online ad fraud operation known as “3ve”. 3ve is a dangerous operation that already has control over 1.7 million different IP addresses. The criminals behind this operation were able to gain this large amount of control by leveraging victim computers infected with different [...]

November 28th, 2018|Categories: Fraud, Security|Tags: , , , , |

Employee Interview- Savannah Bass

Meet The IT Company’s team member- Savannah Bass! Last March, Savannah was paired with The IT Company through a contractor company called Belay. Belay takes employees through an interview process and then sets them up with companies that match their skillset. Prior to Belay, Savannah had worked for a tech startup company in Seattle as [...]

November 27th, 2018|Categories: Employee Interview, Small Businesses|Tags: , , |

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

ALERT! Holiday Scams

This holiday season, while you’re searching for the perfect gifts for your loved ones, the FTC wants to encourage you to be aware of potential online dangers. Yesterday, the FTC released an alert on Holiday Scams and Malware Campaigns. They are encouraging people to cautious of dangers such as: Unsolicited emails. Malicious links and attachments. [...]

November 20th, 2018|Categories: Malware, Security|Tags: , |

Are You Watching Your Network?

Did you know? The average hacker lays dormant on your network, watching you for 200 days before they strike? What is your business doing to protect yourself during the 200 days that the attacker is preparing to attack? If an attacker is watching your network, you should be too. Here’s the deal- when a hacker gains [...]

November 13th, 2018|Categories: Security, Technology|Tags: , , , , |

Avoid Uber’s 148 Million Dollar Privacy Mistake

This week's blog we have a special guest writer- John Wood from Egerton McAfee! Keep reading to get John's legal perspective on how you can avoid making the same privacy mistake Uber made. In September Uber agreed to pay all 50 states a combined $148,000,000 to settle a claim that Uber failed to abide by [...]

November 6th, 2018|Categories: Data Breach, Privacy|Tags: , , , , , , |