Here’s What’s Happening

Cybercriminals Target Online Payroll Accounts

ALERT BLOG! Today’s alert is based around the recent FBI alert informing people of a “Cybercrime using social engineering techniques to steal employee credentials and commit payroll diversion.” What does this mean? Essentially this is a new type of attack where cyber criminals are targeting employees through their online payroll accounts. How are they doing [...]

September 27th, 2018|Categories: Phishing, Security|Tags: , |

CIS Controls 1 & 2

Beginning our series discussing each individual CIS Control, are controls 1 and 2. Both of which are absolutely critical points for securing your network. While these are extremely important, they are two steps a lot of people skip. The reasoning and intention behind these two controls is to prepare you for the remaining 18 controls [...]

September 25th, 2018|Categories: CIS Controls, Security|Tags: , , |

CIS Controls Series

Today’s blog is an introduction to the newest addition to our variety of technical topics- a series on CIS Controls! Before we dive into the details of each control, we would like to take this opportunity to show the value that this list can add to your organizations Cyber resilience. So what are CIS Controls? [...]

September 18th, 2018|Categories: CIS Controls, Security|Tags: , , |

Can You Really Rely on The Cloud?

Can you really rely on the cloud? Recent cloud outages have raised questions about the reliability of cloud providers. At the core, “the cloud” runs on highly scalable, redundant data centers. These data centers are still comprised of the same components of traditional data centers, including servers, storage, networking, cooling, and power. Typically, within a [...]

September 11th, 2018|Categories: Cloud Provider, Security|Tags: , , |

Recent Events Recap!

No one wants to find out that they have fallen victim to a cyber attack or any type of technical scam. At The IT Company, we value the opportunity to go out into the community and have discussions that alert people about evolving and reoccurring information on these topics. While there is no “take these [...]

September 4th, 2018|Categories: Healthcare, Security|Tags: , , , , |

CPU Vulnerabilities Disclosed

This month Intel released a security advisory stating there were new variants on a recent vulnerability. We asked The IT Company’s expert, James Harrell, to expand on the information from the recent guide to L1TF and Foreshadow. What are L1TF and Foreshadow? L1TF and Foreshadow are variants of a vulnerability discovered in 2017. The previous [...]

August 24th, 2018|Categories: Security|Tags: , , |