Cyberattack

/Cyberattack

5 Things You Should Know About Healthcare Cybersecurity

Healthcare is, and continues to be, a top target for cyber attacks. And statistics show that won’t be changing any time soon. Cyber criminals are after information they can use and the fact of the matter is, medical files contain the very information the criminals are after. The amount of exploitable financial and personal data [...]

November 12th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity, Healthcare|Tags: , , |

LATEST Method of Phishing Attacks

What if we told you that cybercriminals are now developing methods to steal your information without leaving a trace back to them? Unfortunately, this is a reality that we all need to be aware of. The latest form of cyberattacks are more dangerous than ever, for this exact reason. Referred to by experts’ as “Heatstroke,” [...]

#1 Password Defense Against Cybercriminals

In a world where the secret network is vastly and rapidly growing, what is your top password defense against cybercriminals? It may sound simple, but there is extreme power and control and in the simplicity of password safety. One of user’s top means of protection is in frequently changing their passwords and using different passwords [...]

October 8th, 2019|Categories: Cyber Secure, Cyberattack, Data Breach, Privacy, Security|Tags: , |

Could Clicking Unsubscribe Put You At Risk?

How many times a week do you get an email advertising a sale or new product, or suggesting you read their new blog or telling you what’s new at their store or company? How often do you actually remember subscribing to that website’s emails? In a technology based world- stores, brands and companies use email [...]

September 3rd, 2019|Categories: Cyber Secure, Cyberattack, KnowBe4|Tags: , , , |

Phishing Email Subjects to Look Out For

Are you aware of what to look out for in phishing scams? In 2018, The IT Company walked you through the most popular subject lines cyber criminals were using in phishing attacks. We are back again with an updated list of the most commonly clicked phishing email subjects in the second quarter of 2019, based [...]

July 30th, 2019|Categories: Cyber Secure, Cyberattack, Social Engineering|Tags: , |

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! In case you haven’t been keeping up we with The IT Company’s blog series, we thought this would be the [...]

July 2nd, 2019|Categories: CIS Controls, Cyberattack|Tags: , , , |

Are You Underestimating Cyberthreats Against You?

Are you underestimating the real cyberthreat risks against your business? It has been noted that smaller businesses do not often believe that they will be targeted by cyber criminals. In The IT Company’s previous blog post, Cyber Criminals Target Small Businesses, we discussed why the lack of concern the majority of SMBs’ have on their [...]

May 7th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity|Tags: , , |

Increase Ransomware Attacks Against Businesses

In today’s blog, The IT Company wa­nts to put an emphasis on the security of businesses and their computer systems. Recent reports and news has made IT companies aware that our job is as important as ever. With an extreme increase in attacks on businesses, IT security needs to be at its strongest and businesses [...]

April 30th, 2019|Categories: Cyberattack, Cybersecurity, Ransomware|Tags: , , , |

Tips to Protecting Your Business and Family From Cyber Crimes

In an attempt to help people truly understand how they can protect their businesses and their family, Scott Augenbaum has written the book The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business From Cybercrime. And in a recent article, people are claiming that this book has the potential to “save your [...]

February 12th, 2019|Categories: Cyberattack, Cybersecurity, Security|Tags: , , , |