Technology

/Technology

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

2019 and Beyond

It's hard to believe it's 2019, and another year in the 21st century came and went. 2018 was like a blur, especially in the world of technology. The pace at which innovation and change is happening continues to accelerate, which creates opportunities and challenges. I feel like as I grow older, I begin to realize [...]

January 15th, 2019|Categories: People, Small Businesses, Technology|Tags: , , , |

Two-Factor Authentication

Today’s blog is a brief highlight on why two Two-Factor Authentication is an important layer in your company’s security. Two-factor authentication is a form of security that not only requires the typical username and password security method, but it with a code that only a specific user has access to. There are different methods to [...]

December 4th, 2018|Categories: Security, Technology|Tags: , , , , |

Cyber Criminals Taking Over Email Inboxes Without Phishing Attacks

We’ve warned our readers several times about different types of phishing attacks and the methods cyber criminals are using to steal your information. Today, we alert you that cyber criminals are now taking over email inboxes without phishing attacks. As always, attackers are constantly finding new ways to intrude. While phishing attacks such as email [...]

Are You Watching Your Network?

Did you know? The average hacker lays dormant on your network, watching you for 200 days before they strike? What is your business doing to protect yourself during the 200 days that the attacker is preparing to attack? If an attacker is watching your network, you should be too. Here’s the deal- when a hacker gains [...]

November 13th, 2018|Categories: Security, Technology|Tags: , , , , |

Executive Briefing by The IT Company!

ALERT: Save the Dates! These four dates between now and February are crucial to the ongoing protection, defense and success of your business in the rapidly changing world of cybersecurity & cybercrime.    This is an invitation only, limited to 12 registrants for each session, exclusive executive briefing. This isn’t going to be a big technical [...]

October 5th, 2018|Categories: People, Security, Technology|Tags: , |

FBI Releases Guidance Against Travel Scams

We have another alert blog for you today! The FBI has released information and tips on how to defend yourself against travel scams. For guidance on how to do so, click on the link below. As always, it is our priority at The IT Company to keep you secure. The more informed you are, the [...]

August 16th, 2018|Categories: Phishing, Technology|Tags: , |

Lunch & Learn Sneak Peek

Today’s blog is a quick sneak peek at our Cyber Threats in Healthcare Lunch & Learn! This Wednesday, August 15th, we will be taking part in a rapid-fire Q&A discussion about the top threats facing Healthcare today. Our own Paul Sponcia will join a panel of five other Knoxville experts of Healthcare and Cyber Security. [...]

August 14th, 2018|Categories: Healthcare, Technology|Tags: , , |