Blog

The Moving Target of Network Security

Man with bow and arrow shooting at ballon with target

Technology is supposed to make things simpler.  Changing IT solutions and a terrifying threat landscape have created a rush of new products and services.  The complexity of Network security has increased 10-fold over the past few years.  IT professionals are hurrying to keep up, understand what’s relevant and implement needed solutions with the moving target […]

i.t.NOW Use Cases

i.t.NOW Use Cases

Over the last few weeks, we’ve been talking to a lot of businesses that are looking for help.  One thing that struck us is that they all seemed to have different reasons for reaching out.  We can solve a lot of different business problems.  These have been interesting and fruitful discussions, and we’ve boiled them […]

Top Security Technologies To Help You Future-Proof Your Onboarding Of New Hires

Man holding holographic lock and holographic circle symbol

A robust onboarding process ensures that 69% of employees remain with the firm for 3 years. Why not consider using security technologies if you’re looking for ways to improve your onboarding process? How can security technologies improve the onboarding process? Keep reading to discover why security technologies are valuable to the onboarding process. Learn about […]

Calculating the Cost of Downtime

Male IT technician looking at server rack with hands behind head

We met with some business owners this week where the current IT provider has neglected their technology for some time.  There were a few contributing reasons for this.  The client is in manufacturing and is hesitant to invest money in technology that they didn’t see improving their production process or output.  The current solution was […]

Recovering Your Business Hardware from WFH Employees

Recovering Your Business Hardware from WFH Employees

There have been a lot of changes over the last few years to how we work.  The rise of work from home has brought with it several new challenges like recovering your business hardware from terminated WFH employees.  We have seen a few different businesses’ takes on that and have been involved on the IT […]

Ransomware and Social Engineering Still Top Threats According to Verizon Data Breach Investigation Report

Ransomware and Social Engineering

Since back in 2008 Verizon has been putting out a report each year called the Data Breach Investigation Report (DBIR).  In 2013 they first wrote about ransomware.  Social engineering was already happening and growing in popularity with bad actors.  The latest edition of DBIR shows that 9 years later Ransomware and Social Engineering are still […]

Retired FBI Agent Cybercrimes Division Talks Cyber Security

FBI Cyber Security

I recently attended an IT industry conference where the topics were understandably cyber security heavy.  One of the speakers that stuck out to me was Scott Augenbaum.  Scott is a retired FBI agent that worked in the cybercrimes division for the last 20 years and has recently retired.  A few things from his address stuck […]

Reducing Human Error

Reducing Human Error

As the saying goes, you’re only as strong as your weakest link, and in the case of cybersecurity, your weakest link is humans.  With the new security challenges brought about by remote work, humans have become more of a cyber risk than ever. As of 2022, 88% of data breaches are caused by human error. […]

Threat Report – Emotet 2.0

EMOTET attack

For several years bad actors have been using Emotet malware and its variants in large scale phishing attacks.  These attacks are meant to compromise business email accounts and then allow them to deliver a payload of ransomware.  Some recent updates from Microsoft have made those attacks less effective, so the hackers have had to pivot. […]