Cybersecurity

/Cybersecurity

New Year, New Methods to Attack Office 365

2020 has just begun, and hackers are already off to a strong start. These criminals are bringing new attacks into the new year. If you are and Office 365 user, this information is critical for you to read. In 2019 and previous years, hackers targeted users often by working to steal your credentials, such as [...]

January 14th, 2020|Categories: Access, Cyberattack, Cybersecurity, Office 365, Phishing|Tags: , |

ALERT- Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

The current tension between Iran and the United States is raising concern in many areas of our country’s security. But due to Iran’s history of using cyber offensive activity, our cybersecurity is a huge concern of target.   In similarity to all cyber criminals, Iranian cyber threat actors are continually improving their cyber attacking capabilities. Iran [...]

January 10th, 2020|Categories: Cyberattack, Cybersecurity|

SMBs are Officially a Top Target For Cyber Attacks

For some time there have been many misconceptions and controversies regarding the risk small and mid-sized businesses are at for cyber attacks. SMBs have often theorized that they are at less risk of falling victim to attacks than large businesses due to being less “in the spotlight," containing a smaller amount of content and data, [...]

Top 10 Tips to Avoid Cyber Attacks This Black Friday Weekend

Are you planning to get some of your holiday shopping done online this year? If so, you are amongst 75% of Americans who will complete at least half of their holiday shopping online. If you’re planning to get your online shopping done over the Black Friday and Cyber Monday weekend, read this important information to [...]

November 26th, 2019|Categories: Cyber Secure, Cybersecurity, People|Tags: , |

Top 2 Reasons to Implement CIS Control 12

It’s far too easy to unintentionally skip out on implementing key CIS Controls. When unaware of the ways in which these controls can add layers to your security people lack prioritizing the implementation of these controls. CIS Control 12- Detects, prevents, and corrects the flow of information transferring networks of different trust levels with a [...]

November 19th, 2019|Categories: CIS Controls, Cybersecurity|Tags: |

5 Things You Should Know About Healthcare Cybersecurity

Healthcare is, and continues to be, a top target for cyber attacks. And statistics show that won’t be changing any time soon. Cyber criminals are after information they can use and the fact of the matter is, medical files contain the very information the criminals are after. The amount of exploitable financial and personal data [...]

November 12th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity, Healthcare|Tags: , , |

TOP 5 Lessons for Better Security!

Are you constantly told how important your security is on the internet?  Do you fear that although you know the importance of cybersecurity, you do not fully understand the extent of what how to be secure? In a recent article written by BizTech Magazine, they shared 5 tips to better online security. We at The [...]

October 29th, 2019|Categories: Cyber Secure, Cybersecurity|Tags: , , |

LATEST Method of Phishing Attacks

What if we told you that cybercriminals are now developing methods to steal your information without leaving a trace back to them? Unfortunately, this is a reality that we all need to be aware of. The latest form of cyberattacks are more dangerous than ever, for this exact reason. Referred to by experts’ as “Heatstroke,” [...]

Rapid Increase in Cybersecurity Threats

On average in Q1 of 2019, 504 new cybersecurity threats were appearing every minute. 504 new threats per minute. That scary increase means that new ransomware has more than doubled just in the first quarter of the year. More specifically, it has had a 118% increase in the first quarter of 2019. KnowBe4 recently shared [...]

September 10th, 2019|Categories: Cyber Secure, Cybersecurity, Ransomware|Tags: , , , , , |

Is Your Office Printer a Threat to Your Security?

How often do you consider your office printer as a threat to your security? At The IT Company, often times the common frustrations we hear about with office printers stem from troubles getting them to run correctly or the way that they are supposed to. Such as turning on, connecting to wireless networks, etc. Office [...]

August 20th, 2019|Categories: Cyber Secure, Cybersecurity, IT provider|Tags: , , |