Here’s What’s Happening

Join Us For Waffle Wednesdays!

Exciting things are happening here at The IT Company this summer! Last month The IT Company hosted our first Waffle Wednesday and we are looking forward to our next one, next week! We have had lots of questions about who can come, what the fee is and what the benefit from coming is! Read this [...]

June 11th, 2019|Categories: Events|Tags: , , |

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services. Center for Internet Security defines this fundamental control as “manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulnerability available to attackers.” [...]

May 28th, 2019|Categories: CIS Controls, Security|Tags: , , |

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8. CIS Control 8 is better known as Malware Defenses. CIS defines control 8 as “controlling the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable [...]

May 21st, 2019|Categories: CIS Controls, Malware|Tags: , , , , |

Our Sincerest Thank You

Cody Crowell here.    I wanted to write our blog this week to express my gratitude to a lot of different people for making our first Poker with Purpose event a success.  We would not have been able to put on this event without our generous sponsors providing funds, prizes, and delicious food & drink!  Those [...]

May 14th, 2019|Categories: Events, Poker With Purpose|Tags: , , |

Are You Underestimating Cyberthreats Against You?

Are you underestimating the real cyberthreat risks against your business? It has been noted that smaller businesses do not often believe that they will be targeted by cyber criminals. In The IT Company’s previous blog post, Cyber Criminals Target Small Businesses, we discussed why the lack of concern the majority of SMBs’ have on their [...]

May 7th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity|Tags: , , |

Increase Ransomware Attacks Against Businesses

In today’s blog, The IT Company wa­nts to put an emphasis on the security of businesses and their computer systems. Recent reports and news has made IT companies aware that our job is as important as ever. With an extreme increase in attacks on businesses, IT security needs to be at its strongest and businesses [...]

April 30th, 2019|Categories: Cyberattack, Cybersecurity, Ransomware|Tags: , , , |

Employee Interview- Kenneth Herring

The IT Company is honored and excited to introduce Kenneth Herring to your IT department! Kenneth has taken on the role as The IT Company’s Business Development Manager. Kenneth’s role includes making a lot of phone calls, attending one-on-one and small group meetings and attending networking events. He will be working to hear and understand [...]

April 23rd, 2019|Categories: Employee Interview|Tags: , , |

CIS Control 7

The IT Company has walked you through CIS Controls 1 through 6. Today, we have chosen to narrow in on Control 7- Email and Web Browser Protections.  CIS Control 7 focuses on the vulnerability of email clients and web browsers due to the amount of end-user interaction.  Organizations should ensure they are running fully supported and [...]

April 16th, 2019|Categories: CIS Controls, Security|Tags: , , , , |

Why You Shouldn’t Rely on One Person to Manage I.T.

At The IT Company we believe it is important not to solely rely on one individual IT person. We find it important that more than one person has access to the tools and credentials that secure your company. Or if the best option for your company isto have only one person with credentials to high [...]

April 9th, 2019|Categories: Partner, Privacy, Security, Small Businesses|Tags: , , |