Technology

/Technology

Two-Factor Authentication

Today’s blog is a brief highlight on why two Two-Factor Authentication is an important layer in your company’s security. Two-factor authentication is a form of security that not only requires the typical username and password security method, but it with a code that only a specific user has access to. There are different methods to [...]

December 4th, 2018|Categories: Security, Technology|Tags: , , , , |

Cyber Criminals Taking Over Email Inboxes Without Phishing Attacks

We’ve warned our readers several times about different types of phishing attacks and the methods cyber criminals are using to steal your information. Today, we alert you that cyber criminals are now taking over email inboxes without phishing attacks. As always, attackers are constantly finding new ways to intrude. While phishing attacks such as email [...]

Are You Watching Your Network?

Did you know? The average hacker lays dormant on your network, watching you for 200 days before they strike? What is your business doing to protect yourself during the 200 days that the attacker is preparing to attack? If an attacker is watching your network, you should be too. Here’s the deal- when a hacker gains [...]

November 13th, 2018|Categories: Security, Technology|Tags: , , , , |

Executive Briefing by The IT Company!

ALERT: Save the Dates! These four dates between now and February are crucial to the ongoing protection, defense and success of your business in the rapidly changing world of cybersecurity & cybercrime.    This is an invitation only, limited to 12 registrants for each session, exclusive executive briefing. This isn’t going to be a big technical [...]

October 5th, 2018|Categories: People, Security, Technology|Tags: , |

FTC Issues Alert on Tech Support Scams

Here at The IT Company we are always looking out for your security.  This means making sure you are aware when we become aware of security alerts that may arise.  The FTC has recently issued an alert that we believe is important to you.  Follow the link below to find additional information and guidance regarding [...]

July 19th, 2018|Categories: Security, Technology|Tags: , |