Security

/Security

2018’s Most Active Ransomware

On October 2nd, an updated version of a highly vicious strain of ransomware was released. This updated version of GandCrab v5 has caught the attention of many researchers and experts- and rightfully so. This particular strain of ransomware has been deemed as the most prolific ransomware of 2018. The first attack of GandCrab was in [...]

October 9th, 2018|Categories: Ransomware, Security|Tags: , , |

Executive Briefing by The IT Company!

ALERT: Save the Dates! These four dates between now and February are crucial to the ongoing protection, defense and success of your business in the rapidly changing world of cybersecurity & cybercrime.    This is an invitation only, limited to 12 registrants for each session, exclusive executive briefing. This isn’t going to be a big technical [...]

October 5th, 2018|Categories: People, Security, Technology|Tags: , |

Cybercriminals Target Online Payroll Accounts

ALERT BLOG! Today’s alert is based around the recent FBI alert informing people of a “Cybercrime using social engineering techniques to steal employee credentials and commit payroll diversion.” What does this mean? Essentially this is a new type of attack where cyber criminals are targeting employees through their online payroll accounts. How are they doing [...]

September 27th, 2018|Categories: Phishing, Security|Tags: , |

CIS Controls 1 & 2

Beginning our series discussing each individual CIS Control, are controls 1 and 2. Both of which are absolutely critical points for securing your network. While these are extremely important, they are two steps a lot of people skip. The reasoning and intention behind these two controls is to prepare you for the remaining 18 controls [...]

September 25th, 2018|Categories: CIS Controls, Security|Tags: , , |

CIS Controls Series

Today’s blog is an introduction to the newest addition to our variety of technical topics- a series on CIS Controls! Before we dive into the details of each control, we would like to take this opportunity to show the value that this list can add to your organizations Cyber resilience. So what are CIS Controls? [...]

September 18th, 2018|Categories: CIS Controls, Security|Tags: , , |

Can You Really Rely on The Cloud?

Can you really rely on the cloud? Recent cloud outages have raised questions about the reliability of cloud providers. At the core, “the cloud” runs on highly scalable, redundant data centers. These data centers are still comprised of the same components of traditional data centers, including servers, storage, networking, cooling, and power. Typically, within a [...]

September 11th, 2018|Categories: Cloud Provider, Security|Tags: , , |

Recent Events Recap!

No one wants to find out that they have fallen victim to a cyber attack or any type of technical scam. At The IT Company, we value the opportunity to go out into the community and have discussions that alert people about evolving and reoccurring information on these topics. While there is no “take these [...]

September 4th, 2018|Categories: Healthcare, Security|Tags: , , , , |

CPU Vulnerabilities Disclosed

This month Intel released a security advisory stating there were new variants on a recent vulnerability. We asked The IT Company’s expert, James Harrell, to expand on the information from the recent guide to L1TF and Foreshadow. What are L1TF and Foreshadow? L1TF and Foreshadow are variants of a vulnerability discovered in 2017. The previous [...]

August 24th, 2018|Categories: Security|Tags: , , |