Security

/Security

CIS Controls Series

Today’s blog is an introduction to the newest addition to our variety of technical topics- a series on CIS Controls! Before we dive into the details of each control, we would like to take this opportunity to show the value that this list can add to your organizations Cyber resilience. So what are CIS Controls? [...]

September 18th, 2018|Categories: CIS Controls, Security|Tags: , , |

Can You Really Rely on The Cloud?

Can you really rely on the cloud? Recent cloud outages have raised questions about the reliability of cloud providers. At the core, “the cloud” runs on highly scalable, redundant data centers. These data centers are still comprised of the same components of traditional data centers, including servers, storage, networking, cooling, and power. Typically, within a [...]

September 11th, 2018|Categories: Cloud Provider, Security|Tags: , , |

Recent Events Recap!

No one wants to find out that they have fallen victim to a cyber attack or any type of technical scam. At The IT Company, we value the opportunity to go out into the community and have discussions that alert people about evolving and reoccurring information on these topics. While there is no “take these [...]

September 4th, 2018|Categories: Healthcare, Security|Tags: , , , , |

CPU Vulnerabilities Disclosed

This month Intel released a security advisory stating there were new variants on a recent vulnerability. We asked The IT Company’s expert, James Harrell, to expand on the information from the recent guide to L1TF and Foreshadow. What are L1TF and Foreshadow? L1TF and Foreshadow are variants of a vulnerability discovered in 2017. The previous [...]

August 24th, 2018|Categories: Security|Tags: , , |

Phishing Attack on Office 365 Users

SECURITY ALERT!   We knew it wouldn’t be long before hackers began to target Microsoft’s Office365 platform directly. We have been informed about a new email Phishing attack, called “PhishPoint” focused on users of the Office365 platform, specifically related to the use of OneDrive and SharePoint.   The scam will, and does, look very authentic to you and your users – so much so that many [...]

August 20th, 2018|Categories: Phishing, Security|Tags: , , |

Why Passwords Are One of the Weakest Links in Your System

We got three of our team member’s together for a discussion on this week’s technology topic. James Harrell, Kyle Kelley, and Cody Muncy gave us their insight and expertise on why employees and their use of passwords can be one of the weakest links in your system. James, Kyle, and Cody explained that weak links [...]

July 24th, 2018|Categories: Data Breach, Phishing, Security|Tags: , , |