i.t.NOW works hard to protect our clients’ networks from security threats and ensure their safety and operability. In those efforts we frequently see what growing threats there are in the wild. Two that we particularly wanted to make our clients aware of are Business Email Compromise (BEC) attacks, and Ransomware. Neither one of these attacks […]
Category Archives: Network Security Services
Antivirus solutions have been continually evolving over the years along with threats and attack patterns. Endpoint detection and response (EDR) is the latest evolution and offers some significant advantages over its predecessors. It’s been a long journey. Here is a brief timeline of AV evolution and some practical advice about the very real advantages of […]
The news is full of the latest companies that have suffered security breaches. These headlines focus on large corporations because the big numbers involved make the attack more impressive. This gives many small business owners a false sense of security -an illusion that there is security through obscurity. There is an idea that a “small […]
That Nigerian prince has finally grown up. Business Email Compromise or BEC is a real and evolving threat. It may have started with humble beginnings but has been continually evolving. Attackers are leveraging a remote workforce and COVID-19 to continue to exploit businesses. Here’s what to look out for in 2021. Money Transfer Requests Accounting […]
We love Office 365. Microsoft has done a great job creating an online set of tools that enable businesses to be mobile and productive. Office 365 is secure, but like most things you should take some steps to make sure your data is safe within the solution. We want to share our top 3 tips […]
Whether you’re a medical practice, a dentist, or a mental health care provider, compliance with HIPAA (Health Insurance Portability and Accountability Act) data security guidelines is likely a requirement that you need to take seriously. Leaked PHI (Personal Health Information) through a security breach or mismanagement of records can cause serious sanctions and hefty fines. […]
Microsoft reports that “81% of data breaches are the result of weak, default, or stolen passwords.” They’re recommending that we get rid of them. There is a strong argument to do so, and some slick alternative authentication methods available and in the works. Why Should We Get Rid Of Them? There are a lot of […]
Through 2020 and the pandemic there has been 4 times as many cases of cybercrime reported to the FBI. Losses from cybercrime are also at an all-time high, surpassing $1 Trillion dollars. Remote work and evolving threat surfaces were some leading areas of concern as IT departments try to make security solutions to the new […]
Phishing is one of the oldest tricks in the scammer’s book and it’s growing in popularity each year. According to Phishing Statistics published by Tessian, 75% of organizations faced some sort of phishing attack last year. A Verizon report says that 96% of phishing attacks are conducted through email. With most companies rushing towards a […]
This is something we hear a lot. We get it. When IT is running great nobody notices it. When it’s a disaster is the number one priority. What about that time in between? Experience dictates that for most small businesses the network has very little maintenance done on it between disasters. It’s in a state […]