Category Archives: Network Security Services

Security Alert: Growing Threats

Growing Threats

i.t.NOW works hard to protect our clients’ networks from security threats and ensure their safety and operability.  In those efforts we frequently see what growing threats there are in the wild.  Two that we particularly wanted to make our clients aware of are Business Email Compromise (BEC) attacks, and Ransomware. Neither one of these attacks […]

Endpoint Detection and Response

Endpoint Detection and Response

Antivirus solutions have been continually evolving over the years along with threats and attack patterns.  Endpoint detection and response (EDR) is the latest evolution and offers some significant advantages over its predecessors.  It’s been a long journey.  Here is a brief timeline of AV evolution and some practical advice about the very real advantages of […]

IT Security for Small Businesses – A Complete Guide

IT Security for Small Business – A Complete Guide

The news is full of the latest companies that have suffered security breaches. These headlines focus on large corporations because the big numbers involved make the attack more impressive. This gives many small business owners a false sense of security -an illusion that there is security through obscurity. There is an idea that a “small […]

The Evolution of Business Email Compromise

The Evolution of BEC

That Nigerian prince has finally grown up.  Business Email Compromise or BEC is a real and evolving threat.  It may have started with humble beginnings but has been continually evolving.  Attackers are leveraging a remote workforce and COVID-19 to continue to exploit businesses.  Here’s what to look out for in 2021. Money Transfer Requests Accounting […]

Securing Office 365

Securing O365

We love Office 365.  Microsoft has done a great job creating an online set of tools that enable businesses to be mobile and productive.  Office 365 is secure, but like most things you should take some steps to make sure your data is safe within the solution.  We want to share our top 3 tips […]

HIPAA Compliance Basics for Healthcare Providers

HIPAA Compliance Basics

Whether you’re a medical practice, a dentist, or a mental health care provider, compliance with HIPAA (Health Insurance Portability and Accountability Act) data security guidelines is likely a requirement that you need to take seriously.  Leaked PHI (Personal Health Information) through a security breach or mismanagement of records can cause serious sanctions and hefty fines.  […]

A World With No Passwords

no passwords

Microsoft reports that “81% of data breaches are the result of weak, default, or stolen passwords.”  They’re recommending that we get rid of them.  There is a strong argument to do so, and some slick alternative authentication methods available and in the works. Why Should We Get Rid Of Them? There are a lot of […]

Cyberthreats in 2021: The Usual Suspects

suspects standing for mug shot

Through 2020 and the pandemic there has been 4 times as many cases of cybercrime reported to the FBI.  Losses from cybercrime are also at an all-time high, surpassing $1 Trillion dollars.  Remote work and evolving threat surfaces were some leading areas of concern as IT departments try to make security solutions to the new […]

How to Spot a Phishing Email and What to Do in Case of an Attack

Phishing is one of the oldest tricks in the scammer’s book and it’s growing in popularity each year. According to Phishing Statistics published by Tessian, 75% of organizations faced some sort of phishing attack last year. A Verizon report says that 96% of phishing attacks are conducted through email. With most companies rushing towards a […]

Everything is NOT Fine

Everything is NOT Fine

This is something we hear a lot.  We get it.  When IT is running great nobody notices it.  When it’s a disaster is the number one priority.  What about that time in between?  Experience dictates that for most small businesses the network has very little maintenance done on it between disasters.  It’s in a state […]