CIS Control 3

Now that you’ve learned about CIS Controls 1 and 2, we want to transition into discussing the importance of CIS Control 3- Continuous Vulnerability Management.

Protect Your Workplace from Cyber Attacks

It’s that time of the week again- National Cybersecurity Awareness Month blog post!

Top Phishing Attack Subject Line

Every type of industry and every person is at risk of phishing attempts. However the healthcare industry is a particularly large target.

Cyber Criminals Target Small Businesses

As promised, we are dedicated to spending the entire month of October highlighting Cybersecurity Awareness, in hopes of joining forces in improving our Nation’s cyber security.

2018's Most Active Ransomware

On October 2nd, an updated version of a highly vicious strain of ransomware was released. This updated version of GandCrab v5 has caught the attention of many researchers and experts- and rightfully [...]

October 9th, 2018 |Categories: Spam, GandCrab, Ransomware, Security, malvertising

Executive Briefing by The IT Company!

ALERT: Save the Dates!

Jason Graf- Where Are They Now?

Meet Jason Graf! Jason was an integral part of The IT Company team for over two years and continues to be a part of our family.

October 2nd, 2018 |Categories: Where Are They Now?, ITCO team, People, IT CO, Cybersecurity

National Cybersecurity Awareness Month

Happy October! The month of October is National Cybersecurity Awareness Month. For the past 15 years, a month has been devoted to emphasizing the importance of cybersecurity. This year, we would like [...]

October 1st, 2018 |Categories: Awareness, ncsam, Cybersecurity

Cybercriminals Target Online Payroll Accounts

ALERT BLOG! Today’s alert is based around the recent FBI alert informing people of a “Cybercrime using social engineering techniques to steal employee credentials and commit payroll diversion.”

September 27th, 2018 |Categories: Phishing, Payroll, Cybercriminals, Security

CIS Controls 1 & 2

Beginning our series discussing each individual CIS Control, are controls 1 and 2. Both of which are absolutely critical points for securing your network. While these are extremely important, they [...]

September 25th, 2018 |Categories: Software, Security, Inventory Assessment, CIS Controls, Hardware