Security Configuration of Network Infrastructure Devices

How important to you and your company is it to prevent cyber criminals from attacking your network and exploiting vulnerable services and settings? If you are not actively implementing and managing a [...]

Attention Microsoft Users!

ATTENTION MICROSOFT USERS!

Financial Industry- Higher Risks of Cyberattacks!

IT companies are constantly emphasizing the importance of security awareness due to its high value for your company’s security.

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! [...]

The Difference of Having a Compliance Manager

At The IT Company, we have many customers in the medical field, so we have some first-hand knowledge of the complexity of healthcare compliance. In our many years of experience, we have seen how much [...]

Do You Rely on Bluetooth?

How many of you use Bluetooth in some form at least once a day? In today’s technology based world, Bluetooth has become a commonality and a tool we are often dependent on. If you’re someone who can [...]

June 18th, 2019 |Categories: IT Frustrations, Bluetooth, Pairing, Microsoft

Join Us For Waffle Wednesdays!

Exciting things are happening here at The IT Company this summer!

June 11th, 2019 |Categories: Community, Waffle Wednesday, Business, Events

Welcome, Bill Furlong!

The IT Company welcomes Bill Furlong as new member of your IT department!

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services.

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8.