Security

/Security

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.  CIS Control 7 focuses on the vulnerability of email clients and web browsers due to the amount of end-user interaction.  Organizations should ensure they are running fully supported and [...]

April 16th, 2019|Categories: CIS Controls, Security|Tags: , , , , |

Why You Shouldn’t Rely on One Person to Manage I.T.

At The IT Company we believe it is important not to solely rely on one individual IT person. We find it important that more than one person has access to the tools and credentials that secure your company. Or if the best option for your company isto have only one person with credentials to high [...]

April 9th, 2019|Categories: Partner, Privacy, Security, Small Businesses|Tags: , , |

Google Play Store’s Malware

As we always do here at The IT Company, we want you to be secure.  This means both providing you with specific actions you can take to secure your IT environment (at home and at work), and providing you with interesting information regarding security exposures and risks. In order to stay up to date and constantly [...]

April 2nd, 2019|Categories: Cyber Secure, Malware, Security|Tags: , , |

Improve Your Router Security

In a recent post by USA Today, they discussed things users need to know about router security in order to help protect themselves against getting hacked by cybercriminals. The IT Company believes that this information is so critical, we chose to highlight it in this week’s blog. The vast majority of people are not familiar with [...]

March 26th, 2019|Categories: Router, Security|Tags: , , , |

Protect Yourself Against Data Breaches

Are you concerned about your online security? If you’re not, you should be. Recent news has shared that earlier this month, security experts discovered the largest collection of stolen account credentials, ever. They then found that this overwhelmingly large collection of information pulled from both old and new data breaches, is just one of seven collections [...]

February 19th, 2019|Categories: Data Breach, Security|Tags: , , , , |

Tips to Protecting Your Business and Family From Cyber Crimes

In an attempt to help people truly understand how they can protect their businesses and their family, Scott Augenbaum has written the book The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business From Cybercrime. And in a recent article, people are claiming that this book has the potential to “save your [...]

February 12th, 2019|Categories: Cyberattack, Cybersecurity, Security|Tags: , , , |

Why it is Critical to Back Up Office 365

Office 365 can be a powerful and productive collaborative tool- which is why it absolutely critical to back it up! A few weeks ago The IT Company blog series talked to readers about how Office 365 is replacing traditional file servers. Because of the lack of growth file servers and the methods of accessing them [...]

February 5th, 2019|Categories: Office 365, Security|Tags: , , , , |

ALERT: FaceTime Bug

We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In some cases it has been reported that video can be seen as well. Apple is working [...]

January 29th, 2019|Categories: Privacy, Security|Tags: , , , , |

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

2-Factor Authentication Vulnerability

Do you count on 2-factor authentication to be the tool that secures your accounts? Recent news has informed users that this extra layer of security many users have implemented, can be vulnerable. Kevin Mitnick, the chief hacking officer at KnowBe4 shares his expertise and concern with the exposure of this recent vulnerability. Like many cyberattacks, it [...]

January 7th, 2019|Categories: 2-Factor Authentication, Security|Tags: , , |