Privacy

/Privacy

What Now? Protecting Your Business Through the Changes From COVID-19

As the chaos of having to quickly deploy a remote workforce is settling down and businesses are beginning to open back up, you may be asking yourself – “what now?” What happens when we go back to the office? Is continuing to deploy a remote work environment a better fit for our company? How do [...]

June 10th, 2020|Categories: COVID-19, Cyber Secure, Interview, IT provider, People, Privacy, Security|Tags: , , |

Top 3 Simple & Cost Effective Steps for Protecting Your Home Work Environment

Are you concerned about your company’s security as employees continue to use at home work capabilities? We have been hearing from business leaders that they are aware and eager to implement extra security cautions, but feel they may not have the funds to do so. CEO Paul Sponcia joined Karen Clark, Director of Somerset Technology Advisory [...]

Top 7 Security Practices for Transitioning Back to Office

If you are among the vast majority of businesses, the COVID-19 pandemic has led you to a remote workforce. Companies all over took their employees to a remote workforce, and many of them did not have time to fully and properly prepare for the transition. Because of the rush to operate remotely, your company’s security [...]

Are You Actively Protecting Your Security as Businesses are Deploying Remote Workforce?

Are you actively protecting your business’ security during the global outbreak of the Coronavirus? The media continues to be filled with necessary precautions and tips to protect our medical health during this time. While The IT Company believes your health is a number one priority, we as a community must not be naïve to the [...]

Lunch & Learn Recap: Are you prepared? Understanding Cyber Threats and Risks to Your Business

Are you aware on the potential harm cyber threats can have on your business? Do you know how to  actively protect your business against these threats? Are your employees trained in recognizing threats and engineered tactics? Do you know what to do if your business falls victim to a cyber attack? These are the kind [...]

March 17th, 2020|Categories: Cyber Secure, Cyberattack, Cybersecurity, Phishing, Privacy|Tags: , , |

Weakest Link in Your Cybersecurity

It is easy to assume that cybercriminals would target newer or mid-level employees when targeting a SMB. But this has recently been found false. A SMB company leader is your weakest link when it comes to your security and in terms of who the criminals are after. Why? The answer is simple. Because of the [...]

November 5th, 2019|Categories: Cyber Secure, Privacy, Security, Security Awareness Training, Small Businesses|Tags: , |

#1 Password Defense Against Cybercriminals

In a world where the secret network is vastly and rapidly growing, what is your top password defense against cybercriminals? It may sound simple, but there is extreme power and control and in the simplicity of password safety. One of user’s top means of protection is in frequently changing their passwords and using different passwords [...]

October 8th, 2019|Categories: Cyber Secure, Cyberattack, Data Breach, Privacy, Security|Tags: , |

5 Ways We Help Our Customers Be More Profitable

Commercial businesses usually exist for one reason, to make a profit for the shareholders - that's the goal as outlined in Eli Goldratt's book "The Goal" - profit. While we may be solving a specific problem, and we may be very passionate about our business and solving that problem, in the end, turning a profit is the goal. That goal achieved as a [...]

August 13th, 2019|Categories: People, Privacy, Security, Technology|

Why You Shouldn’t Rely on One Person to Manage I.T.

At The IT Company we believe it is important not to solely rely on one individual IT person. We find it important that more than one person has access to the tools and credentials that secure your company. Or if the best option for your company isto have only one person with credentials to high [...]

April 9th, 2019|Categories: Partner, Privacy, Security, Small Businesses|Tags: , , |

ALERT: FaceTime Bug

We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In some cases it has been reported that video can be seen as well. Apple is working [...]

January 29th, 2019|Categories: Privacy, Security|Tags: , , , , |