Here’s What’s Happening

Is Your Business Prepared for a Cyber Attack? – Free Lunch & Learn

On Tuesday, March 10, we’re providing an opportunity for business owners and decision makers like you to learn how to make sure your business isn’t an easy target for cyber attacks with the next installment in our Lunch & Learn series: “Are You Prepared? Understanding Cyber Threats & Risks to Your Business.” Are You Aware [...]

How Can Your Architecture or Engineering Firm Take Back Stolen Time with the Right IT Strategy?

You and your employees have important tasks to do. You didn’t spend countless hours and nights for years in the architecture or engineering labs at school to waste all day restarting the router because of a failing internet connection, or solving why the printer doesn’t work after installing new software. Unfortunately, that’s what many architects [...]

February 14th, 2020|Categories: IT provider, Small Businesses, Technology|

#1 Reason Users Shouldn’t Give Admin Rights to a Machine

If you are a Windows user,  your security has been put at high risk this past week. Forbes released an online article confirming the NSA curveball crypto vulnerability earlier this week, and followed up by confirming an even larger security concern of a zero-day vulnerability being actively exploited. There has not yet been a fix [...]

January 21st, 2020|Categories: Alert, Cyber Secure, Malware, Microsoft|Tags: , , |

New Year, New Methods to Attack Office 365

2020 has just begun, and hackers are already off to a strong start. These criminals are bringing new attacks into the new year. If you are and Office 365 user, this information is critical for you to read. In 2019 and previous years, hackers targeted users often by working to steal your credentials, such as [...]

January 14th, 2020|Categories: Access, Cyberattack, Cybersecurity, Office 365, Phishing|Tags: , |

ALERT- Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

The current tension between Iran and the United States is raising concern in many areas of our country’s security. But due to Iran’s history of using cyber offensive activity, our cybersecurity is a huge concern of target.   In similarity to all cyber criminals, Iranian cyber threat actors are continually improving their cyber attacking capabilities. Iran [...]

January 10th, 2020|Categories: Cyberattack, Cybersecurity|

#1 Way Passwords Can Fail You

How often do you change your passwords? How often do you reuse old passwords? Do you use the same password amongst multiple different platforms? The number 1 way passwords are failing to protect you is when users are reusing passwords, leading to weak security for their accounts. If you keep up with The IT Company’s [...]

December 17th, 2019|Categories: Cyber Secure, Password Security|Tags: , , , |

#1 Frustration About IT- and How Our Service Coordinator Works to Resolve It

Picture this- you walk into work on a Monday morning and start getting settled for the week. You go to log into your computer and your password needs to be reset. You call your IT guy- voicemail. After waiting an hour with no response, you call again- voicemail. You try again for a third time, [...]

December 10th, 2019|Categories: Employee Interview, IT provider, Partner, People|Tags: , , |

SMBs are Officially a Top Target For Cyber Attacks

For some time there have been many misconceptions and controversies regarding the risk small and mid-sized businesses are at for cyber attacks. SMBs have often theorized that they are at less risk of falling victim to attacks than large businesses due to being less “in the spotlight," containing a smaller amount of content and data, [...]

Top 10 Tips to Avoid Cyber Attacks This Black Friday Weekend

Are you planning to get some of your holiday shopping done online this year? If so, you are amongst 75% of Americans who will complete at least half of their holiday shopping online. If you’re planning to get your online shopping done over the Black Friday and Cyber Monday weekend, read this important information to [...]

November 26th, 2019|Categories: Cyber Secure, Cybersecurity, People|Tags: , |

Top 2 Reasons to Implement CIS Control 12

It’s far too easy to unintentionally skip out on implementing key CIS Controls. When unaware of the ways in which these controls can add layers to your security people lack prioritizing the implementation of these controls. CIS Control 12- Detects, prevents, and corrects the flow of information transferring networks of different trust levels with a [...]

November 19th, 2019|Categories: CIS Controls, Cybersecurity|Tags: |