About Macy Brink

CIS Control 6

The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and control 5 [...]

March 5th, 2019 |Categories: Technology, CIS Controls

Prince Technologies- Structured Network Cabling

To be a great IT Services company, you have to realize which things you can do well, and which tasks you should partner with a company that specializes in that field. For us, one of those tasks that [...]

Protect Yourself Against Data Breaches

Are you concerned about your online security? If you’re not, you should be.

Tips to Protecting Your Business and Family From Cyber Crimes

In an attempt to help people truly understand how they can protect their businesses and their family, Scott Augenbaum has written the book The Secret to Cybersecurity: A Simple Plan to Protect Your [...]

Why it is Critical to Back Up Office 365

Office 365 can be a powerful and productive collaborative tool- which is why it absolutely critical to back it up!

February 5th, 2019 |Categories: Back Up, File Server, Office 365, Security, Data, Files, Microsoft

Security Awareness Training for Kids

Kids are the most vulnerable online population and the most likely to be unaware of the potential online dangers. Security awareness is not only vital to adults, but to anyone who has access to [...]

ALERT: FaceTime Bug

We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In [...]

January 29th, 2019 |Categories: Privacy, Disable, Bug, Security, iPhone, FaceTime

Employee Interview- Macy Brink

Macy Brink here! Each week I have the opportunity to produce The IT Company’s blog. Part of my role at The IT Company is devoting time to interviewing customers, partners, and employees, researching [...]

January 29th, 2019 |Categories: People, Employee Interview, Blog, Marketing, The IT Company

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top [...]

Ransomware Attacks on Healthcare

Healthcare organizations have been a large target for cyber criminals for many years. Recent studies are showing that while healthcare organizations continue to be a target for attacks, there is a [...]

January 16th, 2019 |Categories: Healthcare, Cyber Secure, Ransomware, Security