Here’s What’s Happening

#1 Reason Users Shouldn’t Give Admin Rights to a Machine

If you are a Windows user,  your security has been put at high risk this past week. Forbes released an online article confirming the NSA curveball crypto vulnerability earlier this week, and followed up by confirming an even larger security concern of a zero-day vulnerability being actively exploited. There has not yet been a fix [...]

January 21st, 2020|Categories: Alert, Cyber Secure, Malware, Microsoft|Tags: , , |

New Year, New Methods to Attack Office 365

2020 has just begun, and hackers are already off to a strong start. These criminals are bringing new attacks into the new year. If you are and Office 365 user, this information is critical for you to read. In 2019 and previous years, hackers targeted users often by working to steal your credentials, such as [...]

January 14th, 2020|Categories: Access, Cyberattack, Cybersecurity, Office 365, Phishing|Tags: , |

ALERT- Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

The current tension between Iran and the United States is raising concern in many areas of our country’s security. But due to Iran’s history of using cyber offensive activity, our cybersecurity is a huge concern of target.   In similarity to all cyber criminals, Iranian cyber threat actors are continually improving their cyber attacking capabilities. Iran [...]

January 10th, 2020|Categories: Cyberattack, Cybersecurity|

#1 Way Passwords Can Fail You

How often do you change your passwords? How often do you reuse old passwords? Do you use the same password amongst multiple different platforms? The number 1 way passwords are failing to protect you is when users are reusing passwords, leading to weak security for their accounts. If you keep up with The IT Company’s [...]

December 17th, 2019|Categories: Cyber Secure, Password Security|Tags: , , , |

#1 Frustration About IT- and How Our Service Coordinator Works to Resolve It

Picture this- you walk into work on a Monday morning and start getting settled for the week. You go to log into your computer and your password needs to be reset. You call your IT guy- voicemail. After waiting an hour with no response, you call again- voicemail. You try again for a third time, [...]

December 10th, 2019|Categories: Employee Interview, IT provider, Partner, People|Tags: , , |

SMBs are Officially a Top Target For Cyber Attacks

For some time there have been many misconceptions and controversies regarding the risk small and mid-sized businesses are at for cyber attacks. SMBs have often theorized that they are at less risk of falling victim to attacks than large businesses due to being less “in the spotlight," containing a smaller amount of content and data, [...]

Top 10 Tips to Avoid Cyber Attacks This Black Friday Weekend

Are you planning to get some of your holiday shopping done online this year? If so, you are amongst 75% of Americans who will complete at least half of their holiday shopping online. If you’re planning to get your online shopping done over the Black Friday and Cyber Monday weekend, read this important information to [...]

November 26th, 2019|Categories: Cyber Secure, Cybersecurity, People|Tags: , |

Top 2 Reasons to Implement CIS Control 12

It’s far too easy to unintentionally skip out on implementing key CIS Controls. When unaware of the ways in which these controls can add layers to your security people lack prioritizing the implementation of these controls. CIS Control 12- Detects, prevents, and corrects the flow of information transferring networks of different trust levels with a [...]

November 19th, 2019|Categories: CIS Controls, Cybersecurity|Tags: |

5 Things You Should Know About Healthcare Cybersecurity

Healthcare is, and continues to be, a top target for cyber attacks. And statistics show that won’t be changing any time soon. Cyber criminals are after information they can use and the fact of the matter is, medical files contain the very information the criminals are after. The amount of exploitable financial and personal data [...]

November 12th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity, Healthcare|Tags: , , |

Weakest Link in Your Cybersecurity

It is easy to assume that cybercriminals would target newer or mid-level employees when targeting a SMB. But this has recently been found false. A SMB company leader is your weakest link when it comes to your security and in terms of who the criminals are after. Why? The answer is simple. Because of the [...]

November 5th, 2019|Categories: Cyber Secure, Privacy, Security, Security Awareness Training, Small Businesses|Tags: , |