Security

/Security

Protect Yourself Against Data Breaches

Are you concerned about your online security? If you’re not, you should be. Recent news has shared that earlier this month, security experts discovered the largest collection of stolen account credentials, ever. They then found that this overwhelmingly large collection of information pulled from both old and new data breaches, is just one of seven collections [...]

February 19th, 2019|Categories: Data Breach, Security|Tags: , , , , |

Tips to Protecting Your Business and Family From Cyber Crimes

In an attempt to help people truly understand how they can protect their businesses and their family, Scott Augenbaum has written the book The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business From Cybercrime. And in a recent article, people are claiming that this book has the potential to “save your [...]

February 12th, 2019|Categories: Cyberattack, Cybersecurity, Security|Tags: , , , |

Why it is Critical to Back Up Office 365

Office 365 can be a powerful and productive collaborative tool- which is why it absolutely critical to back it up! A few weeks ago The IT Company blog series talked to readers about how Office 365 is replacing traditional file servers. Because of the lack of growth file servers and the methods of accessing them [...]

February 5th, 2019|Categories: Office 365, Security|Tags: , , , , |

ALERT: FaceTime Bug

We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In some cases it has been reported that video can be seen as well. Apple is working [...]

January 29th, 2019|Categories: Privacy, Security|Tags: , , , , |

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

2-Factor Authentication Vulnerability

Do you count on 2-factor authentication to be the tool that secures your accounts? Recent news has informed users that this extra layer of security many users have implemented, can be vulnerable. Kevin Mitnick, the chief hacking officer at KnowBe4 shares his expertise and concern with the exposure of this recent vulnerability. Like many cyberattacks, it [...]

January 7th, 2019|Categories: 2-Factor Authentication, Security|Tags: , , |

Two-Factor Authentication

Today’s blog is a brief highlight on why two Two-Factor Authentication is an important layer in your company’s security. Two-factor authentication is a form of security that not only requires the typical username and password security method, but it with a code that only a specific user has access to. There are different methods to [...]

December 4th, 2018|Categories: Security, Technology|Tags: , , , , |

Marriott Hotel’s Database Hacked!

This morning CNBC published a news release revealing that Marriott’s Starwood Hotel's database has been hacked, compromising the information of 500 million guests. Marriott shared that the data breach is still under investigation and they are unable to give a list of specific hotel locations effected, but they are fairly certain the breach has only [...]

November 30th, 2018|Categories: Fraud, Security|Tags: , , , |

Cyber Criminals Taking Over Email Inboxes Without Phishing Attacks

We’ve warned our readers several times about different types of phishing attacks and the methods cyber criminals are using to steal your information. Today, we alert you that cyber criminals are now taking over email inboxes without phishing attacks. As always, attackers are constantly finding new ways to intrude. While phishing attacks such as email [...]

Major Online Ad Fraud Operation- 3ve

Yesterday the FTC and DHS released a joint alert on a major online ad fraud operation known as “3ve”. 3ve is a dangerous operation that already has control over 1.7 million different IP addresses. The criminals behind this operation were able to gain this large amount of control by leveraging victim computers infected with different [...]

November 28th, 2018|Categories: Fraud, Security|Tags: , , , , |