Security

/Security

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

ALERT! Holiday Scams

This holiday season, while you’re searching for the perfect gifts for your loved ones, the FTC wants to encourage you to be aware of potential online dangers. Yesterday, the FTC released an alert on Holiday Scams and Malware Campaigns. They are encouraging people to cautious of dangers such as: Unsolicited emails. Malicious links and attachments. [...]

November 20th, 2018|Categories: Malware, Security|Tags: , |

Are You Watching Your Network?

Did you know? The average hacker lays dormant on your network, watching you for 200 days before they strike? What is your business doing to protect yourself during the 200 days that the attacker is preparing to attack? If an attacker is watching your network, you should be too. Here’s the deal- when a hacker gains [...]

November 13th, 2018|Categories: Security, Technology|Tags: , , , , |

Why You Have to Have an Automated Security Awareness Training Program

Last Friday we held an Executive Briefing where several of our customers joined us over lunch for a great discussion. Paul Sponcia walked the audience through the concept of “Why You Have to Have an Automated Security Awareness Training Program.” Here is list of a few highlights from Friday’s lunch: Users are unaware of the [...]

International Charity Fraud Awareness

The FTC has released a promotion highlighting this week as the first annual International Charity Fraud Awareness Week.  We like to think that donating to a charity is a safe and simple thing to do. But in today’s world, cyber criminals won’t stop for even the most innocent actions. Charity scams are becoming more popular [...]

October 25th, 2018|Categories: Fraud, Security|Tags: , |

CIS Control 3

Now that you’ve learned about CIS Controls 1 and 2, we want to transition into discussing the importance of CIS Control 3- Continuous Vulnerability Management.  As we talked about in the last CIS Control blog, controls 1 and 2 are building blocks to prepare for control 3. For control 1, you want to know what you have [...]

October 23rd, 2018|Categories: CIS Controls, Security|Tags: , , |

2018’s Most Active Ransomware

On October 2nd, an updated version of a highly vicious strain of ransomware was released. This updated version of GandCrab v5 has caught the attention of many researchers and experts- and rightfully so. This particular strain of ransomware has been deemed as the most prolific ransomware of 2018. The first attack of GandCrab was in [...]

October 9th, 2018|Categories: Ransomware, Security|Tags: , , |

Executive Briefing by The IT Company!

ALERT: Save the Dates! These four dates between now and February are crucial to the ongoing protection, defense and success of your business in the rapidly changing world of cybersecurity & cybercrime.    This is an invitation only, limited to 12 registrants for each session, exclusive executive briefing. This isn’t going to be a big technical [...]

October 5th, 2018|Categories: People, Security, Technology|Tags: , |

Cybercriminals Target Online Payroll Accounts

ALERT BLOG! Today’s alert is based around the recent FBI alert informing people of a “Cybercrime using social engineering techniques to steal employee credentials and commit payroll diversion.” What does this mean? Essentially this is a new type of attack where cyber criminals are targeting employees through their online payroll accounts. How are they doing [...]

September 27th, 2018|Categories: Phishing, Security|Tags: , |

CIS Controls 1 & 2

Beginning our series discussing each individual CIS Control, are controls 1 and 2. Both of which are absolutely critical points for securing your network. While these are extremely important, they are two steps a lot of people skip. The reasoning and intention behind these two controls is to prepare you for the remaining 18 controls [...]

September 25th, 2018|Categories: CIS Controls, Security|Tags: , , |