Here’s What’s Happening

Attention Microsoft Users!

ATTENTION MICROSOFT USERS! If you are someone who contributes to the nearly 50% of the world’s organizations who use Office 365, you want to read this! Because of the continued increase in the number of companies in the world using Microsoft software, cybercriminals are increasingly shifting their focus to using Microsoft’s identity in their phishing [...]

Financial Industry- Higher Risks of Cyberattacks!

IT companies are constantly emphasizing the importance of security awareness due to its high value for your company’s security. Are you in the financial industry? We have some critical information pertaining to your security being at risk! KnowBe4- the world’s largest security awareness training and simulated phishing platform dedicated to helping you manage the problem [...]

July 9th, 2019|Categories: Security, Security Awareness Training|Tags: , , |

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! In case you haven’t been keeping up we with The IT Company’s blog series, we thought this would be the [...]

July 2nd, 2019|Categories: CIS Controls, Cyberattack|Tags: , , , |

The Difference of Having a Compliance Manager

At The IT Company, we have many customers in the medical field, so we have some first-hand knowledge of the complexity of healthcare compliance.  In our many years of experience, we have seen how much time, dedication and consistency is involved in keeping up with compliance regulations. We spoke with our customer Baptist Eye Surgeons [...]

June 25th, 2019|Categories: Customer Interview, HIPAA, Security|Tags: , , |

Do You Rely on Bluetooth?

How many of you use Bluetooth in some form at least once a day? In today’s technology based world, Bluetooth has become a commonality and a tool we are often dependent on. If you’re someone who can relate to utilizing the advantages of Bluetooth, I want you to imagine going to pair a device to [...]

June 18th, 2019|Categories: Bluetooth, Microsoft|Tags: , |

Join Us For Waffle Wednesdays!

Exciting things are happening here at The IT Company this summer! Last month The IT Company hosted our first Waffle Wednesday and we are looking forward to our next one, next week! We have had lots of questions about who can come, what the fee is and what the benefit from coming is! Read this [...]

June 11th, 2019|Categories: Events|Tags: , , |

Do Software Packages Install Services Without You Knowing?

CIS Control 9 is up next! CIS Control 9 is titled as the Limitation and Control of Network Ports, Protocols and Services. Center for Internet Security defines this fundamental control as “manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulnerability available to attackers.” [...]

May 28th, 2019|Categories: CIS Controls, Security|Tags: , , |

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8. CIS Control 8 is better known as Malware Defenses. CIS defines control 8 as “controlling the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable [...]

May 21st, 2019|Categories: CIS Controls, Malware|Tags: , , , , |

Our Sincerest Thank You

Cody Crowell here.    I wanted to write our blog this week to express my gratitude to a lot of different people for making our first Poker with Purpose event a success.  We would not have been able to put on this event without our generous sponsors providing funds, prizes, and delicious food & drink!  Those [...]

May 14th, 2019|Categories: Events, Poker With Purpose|Tags: , , |