Security

/Tag:Security

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8. CIS Control 8 is better known as Malware Defenses. CIS defines control 8 as “controlling the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable [...]

May 21st, 2019|Categories: CIS Controls, Malware|Tags: , , , , |

Are You Underestimating Cyberthreats Against You?

Are you underestimating the real cyberthreat risks against your business? It has been noted that smaller businesses do not often believe that they will be targeted by cyber criminals. In The IT Company’s previous blog post, Cyber Criminals Target Small Businesses, we discussed why the lack of concern the majority of SMBs’ have on their [...]

May 7th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity|Tags: , , |

Increase Ransomware Attacks Against Businesses

In today’s blog, The IT Company wa­nts to put an emphasis on the security of businesses and their computer systems. Recent reports and news has made IT companies aware that our job is as important as ever. With an extreme increase in attacks on businesses, IT security needs to be at its strongest and businesses [...]

April 30th, 2019|Categories: Cyberattack, Cybersecurity, Ransomware|Tags: , , , |

Security Awareness Training for Kids

Kids are the most vulnerable online population and the most likely to be unaware of the potential online dangers. Security awareness is not only vital to adults, but to  anyone who has access to device. The IT Company’s partner KnowBe4 is now offering a children’s cybersecurity activity kit to the public- and there’s no cost! [...]

February 1st, 2019|Categories: KnowBe4, Security Awareness Training|Tags: , , , , |

ALERT: FaceTime Bug

We wanted to alert you all that there has been a bug discovered in FaceTime. The bug allows anyone to call you and hear the audio from your phone, regardless of if you answer the phone or not. In some cases it has been reported that video can be seen as well. Apple is working [...]

January 29th, 2019|Categories: Privacy, Security|Tags: , , , , |

Ransomware Attacks on Healthcare

Healthcare organizations have been a large target for cyber criminals for many years. Recent studies are showing that while healthcare organizations continue to be a target for attacks, there is a downward trend in the number of attacks on the healthcare industry. This trend is seemingly positive news, but healthcare organizations (of all sizes) should [...]

January 16th, 2019|Categories: Cyber Secure, Healthcare|Tags: , , |

2019 and Beyond

It's hard to believe it's 2019, and another year in the 21st century came and went. 2018 was like a blur, especially in the world of technology. The pace at which innovation and change is happening continues to accelerate, which creates opportunities and challenges. I feel like as I grow older, I begin to realize [...]

January 15th, 2019|Categories: People, Small Businesses, Technology|Tags: , , , |

Office365

Our mission is simple, Happy Customers. We actually spend a lot of time thinking about this- “what ways can we continue to produce and/or increase the happiness of our clients?” We are also always thinking about how to minimize the risks out there for customers and improve the IT support we provide.   We understand that technology can be, and often is, frustrating. Our customers rarely call us [...]

December 18th, 2018|Categories: Microsoft, Office 365|Tags: , , , , , , , , , |

CIS Control 4

The last few months we’ve taken you through the steps and importance of CIS Controls 1,2 and 3. Today, we introduce you to another vital piece in your security, CIS Control 4. Control 4 is the continued vulnerability assessment remediation. Our first three controls give us an inventory of devices, the software on the network, [...]

November 20th, 2018|Categories: CIS Controls, Security|Tags: , , , |

Avoid Uber’s 148 Million Dollar Privacy Mistake

This week's blog we have a special guest writer- John Wood from Egerton McAfee! Keep reading to get John's legal perspective on how you can avoid making the same privacy mistake Uber made. In September Uber agreed to pay all 50 states a combined $148,000,000 to settle a claim that Uber failed to abide by [...]

November 6th, 2018|Categories: Data Breach, Privacy|Tags: , , , , , , |