Here’s What’s Happening

Phishing Email Subjects to Look Out For

Are you aware of what to look out for in phishing scams? In 2018, The IT Company walked you through the most popular subject lines cyber criminals were using in phishing attacks. We are back again with an updated list of the most commonly clicked phishing email subjects in the second quarter of 2019, based [...]

July 30th, 2019|Categories: Cyber Secure, Cyberattack, Social Engineering|Tags: , |

Security Configuration of Network Infrastructure Devices

How important to you and your company is it to prevent cyber criminals from attacking your network and exploiting vulnerable services and settings? If you are not actively implementing and managing a security configuration of network infrastructure devices, you need to read this. CIS Control 11 is next up in The IT Company’s CIS Controls blog [...]

July 23rd, 2019|Categories: CIS Controls, Cybersecurity|Tags: , , , |

Attention Microsoft Users!

ATTENTION MICROSOFT USERS! If you are someone who contributes to the nearly 50% of the world’s organizations who use Office 365, you want to read this! Because of the continued increase in the number of companies in the world using Microsoft software, cybercriminals are increasingly shifting their focus to using Microsoft’s identity in their phishing [...]

Financial Industry- Higher Risks of Cyberattacks!

IT companies are constantly emphasizing the importance of security awareness due to its high value for your company’s security. Are you in the financial industry? We have some critical information pertaining to your security being at risk! KnowBe4- the world’s largest security awareness training and simulated phishing platform dedicated to helping you manage the problem [...]

July 9th, 2019|Categories: Security, Security Awareness Training|Tags: , , |

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! In case you haven’t been keeping up we with The IT Company’s blog series, we thought this would be the [...]

July 2nd, 2019|Categories: CIS Controls, Cyberattack|Tags: , , , |

The Difference of Having a Compliance Manager

At The IT Company, we have many customers in the medical field, so we have some first-hand knowledge of the complexity of healthcare compliance.  In our many years of experience, we have seen how much time, dedication and consistency is involved in keeping up with compliance regulations. We spoke with our customer Baptist Eye Surgeons [...]

June 25th, 2019|Categories: Customer Interview, HIPAA, Security|Tags: , , |

Do You Rely on Bluetooth?

How many of you use Bluetooth in some form at least once a day? In today’s technology based world, Bluetooth has become a commonality and a tool we are often dependent on. If you’re someone who can relate to utilizing the advantages of Bluetooth, I want you to imagine going to pair a device to [...]

June 18th, 2019|Categories: Bluetooth, Microsoft|Tags: , |

Join Us For Waffle Wednesdays!

Exciting things are happening here at The IT Company this summer! Last month The IT Company hosted our first Waffle Wednesday and we are looking forward to our next one, next week! We have had lots of questions about who can come, what the fee is and what the benefit from coming is! Read this [...]

June 11th, 2019|Categories: Events|Tags: , , |

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services. Center for Internet Security defines this fundamental control as “manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulnerability available to attackers.” [...]

May 28th, 2019|Categories: CIS Controls, Security|Tags: , , |