CIS Control 6
The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and control 5 [...]
The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and control 5 [...]
To be a great IT Services company, you have to realize which things you can do well, and which tasks you should partner with a company that specializes in that field. For us, one of those tasks that [...]
Are you concerned about your online security? If you’re not, you should be.
In an attempt to help people truly understand how they can protect their businesses and their family, Scott Augenbaum has written the book The Secret to Cybersecurity: A Simple Plan to Protect Your [...]
Office 365 can be a powerful and productive collaborative tool- which is why it absolutely critical to back it up!
Kids are the most vulnerable online population and the most likely to be unaware of the potential online dangers. Security awareness is not only vital to adults, but to anyone who has access to [...]
We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In [...]
Macy Brink here! Each week I have the opportunity to produce The IT Company’s blog. Part of my role at The IT Company is devoting time to interviewing customers, partners, and employees, researching [...]
Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top [...]
Healthcare organizations have been a large target for cyber criminals for many years. Recent studies are showing that while healthcare organizations continue to be a target for attacks, there is a [...]