Security

/Tag:Security

LATEST Method of Phishing Attacks

What if we told you that cybercriminals are now developing methods to steal your information without leaving a trace back to them? Unfortunately, this is a reality that we all need to be aware of. The latest form of cyberattacks are more dangerous than ever, for this exact reason. Referred to by experts’ as “Heatstroke,” [...]

Office 365 Targeted by Cybercriminals

Office 365 is a top priority for cybercriminals to gain access to. We will keep this blog short and to the point. We may sound like a broken record, but The IT Company cannot emphasize the importance of educating your employees through Security Awareness Training enough. Today we especially want to emphasize this need for [...]

September 24th, 2019|Categories: Microsoft, Office 365, Security Awareness Training|Tags: , |

Could Clicking Unsubscribe Put You At Risk?

How many times a week do you get an email advertising a sale or new product, or suggesting you read their new blog or telling you what’s new at their store or company? How often do you actually remember subscribing to that website’s emails? In a technology based world- stores, brands and companies use email [...]

September 3rd, 2019|Categories: Cyber Secure, Cyberattack, KnowBe4|Tags: , , , |

Let Your IT Company Manage Security Configurations for Network Devices

Establish. Implement. Actively Manage. How often do you think about your company’s security configurations for network devices? Chances are, for most people the answer is rarely. Which is how it should be. Having an IT Company who manages technology aspects such as this allows you to focus on your role at your company, rather than [...]

August 27th, 2019|Categories: CIS Controls, Cyber Secure, IT provider|Tags: , , |

Is Your Office Printer a Threat to Your Security?

How often do you consider your office printer as a threat to your security? At The IT Company, often times the common frustrations we hear about with office printers stem from troubles getting them to run correctly or the way that they are supposed to. Such as turning on, connecting to wireless networks, etc. Office [...]

August 20th, 2019|Categories: Cyber Secure, Cybersecurity, IT provider|Tags: , , |

Security Configuration of Network Infrastructure Devices

How important to you and your company is it to prevent cyber criminals from attacking your network and exploiting vulnerable services and settings? If you are not actively implementing and managing a security configuration of network infrastructure devices, you need to read this. CIS Control 11 is next up in The IT Company’s CIS Controls blog [...]

July 23rd, 2019|Categories: CIS Controls, Cybersecurity|Tags: , , , |

How Mature Are Your Data Recovery Capabilities?

This month we highlight the next CIS Control in The IT Company’s blog series! The IT company has walked you through the first nine CIS Controls, which means we are about halfway through the controls! In case you haven’t been keeping up we with The IT Company’s blog series, we thought this would be the [...]

July 2nd, 2019|Categories: CIS Controls, Cyberattack|Tags: , , , |

The Difference of Having a Compliance Manager

At The IT Company, we have many customers in the medical field, so we have some first-hand knowledge of the complexity of healthcare compliance.  In our many years of experience, we have seen how much time, dedication and consistency is involved in keeping up with compliance regulations. We spoke with our customer Baptist Eye Surgeons [...]

June 25th, 2019|Categories: Customer Interview, HIPAA, Security|Tags: , , |

Are Your Defenses Against Malware Strong Enough?

The IT Company Blog Series is back with another CIS Control blog! Next up is CIS Control 8. CIS Control 8 is better known as Malware Defenses. CIS defines control 8 as “controlling the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable [...]

May 21st, 2019|Categories: CIS Controls, Malware|Tags: , , , , |

Are You Underestimating Cyberthreats Against You?

Are you underestimating the real cyberthreat risks against your business? It has been noted that smaller businesses do not often believe that they will be targeted by cyber criminals. In The IT Company’s previous blog post, Cyber Criminals Target Small Businesses, we discussed why the lack of concern the majority of SMBs’ have on their [...]

May 7th, 2019|Categories: Cyber Secure, Cyberattack, Cybersecurity|Tags: , , |