Cybersecurity

/Cybersecurity

SMBs are Officially a Top Target For Cyber Attacks

For some time there have been many misconceptions and controversies regarding the risk small and mid-sized businesses are at for cyber attacks. SMBs have often theorized that they are at less risk of falling victim to attacks than large businesses due to being less “in the spotlight," containing a smaller amount of content and data, [...]

Top 10 Tips to Avoid Cyber Attacks This Black Friday Weekend

Are you planning to get some of your holiday shopping done online this year? If so, you are amongst 75% of Americans who will complete at least half of their holiday shopping online. If you’re planning to get your online shopping done over the Black Friday and Cyber Monday weekend, read this important information to [...]

November 26th, 2019|Categories: Cyber Secure, Cybersecurity, People|Tags: , |

Top 2 Reasons to Implement CIS Control 12

It’s far too easy to unintentionally skip out on implementing key CIS Controls. When unaware of the ways in which these controls can add layers to your security people lack prioritizing the implementation of these controls. CIS Control 12- Detects, prevents, and corrects the flow of information transferring networks of different trust levels with a [...]

November 19th, 2019|Categories: CIS Controls, Cybersecurity|Tags: |

5 Things You Should Know About Healthcare Cybersecurity

Healthcare is, and continues to be, a top target for cyber attacks. And statistics show that won’t be changing any time soon. Cyber criminals are after information they can use and the fact of the matter is, medical files contain the very information the criminals are after. The amount of exploitable financial and personal data [...]

November 12th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity, Healthcare|Tags: , , |

TOP 5 Lessons for Better Security!

Are you constantly told how important your security is on the internet?  Do you fear that although you know the importance of cybersecurity, you do not fully understand the extent of what how to be secure? In a recent article written by BizTech Magazine, they shared 5 tips to better online security. We at The [...]

October 29th, 2019|Categories: Cyber Secure, Cybersecurity|Tags: , , |

LATEST Method of Phishing Attacks

What if we told you that cybercriminals are now developing methods to steal your information without leaving a trace back to them? Unfortunately, this is a reality that we all need to be aware of. The latest form of cyberattacks are more dangerous than ever, for this exact reason. Referred to by experts’ as “Heatstroke,” [...]

Rapid Increase in Cybersecurity Threats

On average in Q1 of 2019, 504 new cybersecurity threats were appearing every minute. 504 new threats per minute. That scary increase means that new ransomware has more than doubled just in the first quarter of the year. More specifically, it has had a 118% increase in the first quarter of 2019. KnowBe4 recently shared [...]

September 10th, 2019|Categories: Cyber Secure, Cybersecurity, Ransomware|Tags: , , , , , |

Is Your Office Printer a Threat to Your Security?

How often do you consider your office printer as a threat to your security? At The IT Company, often times the common frustrations we hear about with office printers stem from troubles getting them to run correctly or the way that they are supposed to. Such as turning on, connecting to wireless networks, etc. Office [...]

August 20th, 2019|Categories: Cyber Secure, Cybersecurity, IT provider|Tags: , , |

Security Configuration of Network Infrastructure Devices

How important to you and your company is it to prevent cyber criminals from attacking your network and exploiting vulnerable services and settings? If you are not actively implementing and managing a security configuration of network infrastructure devices, you need to read this. CIS Control 11 is next up in The IT Company’s CIS Controls blog [...]

July 23rd, 2019|Categories: CIS Controls, Cybersecurity|Tags: , , , |

Attention Microsoft Users!

ATTENTION MICROSOFT USERS! If you are someone who contributes to the nearly 50% of the world’s organizations who use Office 365, you want to read this! Because of the continued increase in the number of companies in the world using Microsoft software, cybercriminals are increasingly shifting their focus to using Microsoft’s identity in their phishing [...]