Category Archives: Network Security

How to Secure Your Website

How to Secure Your Website

Every year there are nearly 10,000 websites banned by Google for being hacked. These websites have lost nearly 95% of their organic traffic and revenue. Keeping your site secure is now more important than ever. When your website is hacked, Google will blacklist your site, marking it as not secure and removing it from the […]

Why you should enable Office 365 Two Factor Authentication

The world is a dangerous place.  Keeping your business safe online can be a chore.  There are a lot of good reasons why you should enable office 365 two factor authentication.  The fact that it makes keeping your data safe easier is one.  Here are a few more. Ease of Use Security needs to be […]

What is EDR Software?

Endpoint Detection and Response software is the newest iteration of Anti-Virus software.  It’s got a new title because EDR does a lot more than your traditional antivirus to protect you against threats.  It’s also one of the only solutions that can offer some protection against ransomware. What is EDR Software The definition goes something like […]

10 Security Solutions Every Business Should Have

10 Security Solutions Every Business Should Have

The world of Cyber Security is full of evolving threats.  We hear about new attack vectors every day and have a very creative bunch of bad actors coming up with new ways to make trouble.  Ransomware is rampant.  Phishing is on the uptick.  IT teams struggle to keep their staff trained on all the security […]

Security Update: FORCEDENTRY – Update your Apple Devices

Security Update

A critical security vulnerability called FORCEDENTRY on IOS and MacOS devices means you should update immediately. Earlier this week apple released a critical software patch to fix an exploit that allows attackers to directly infect iPhones and other Apple devices.  No user interaction is needed, which makes this attack particularly dangerous. The exploit was originally […]

The Evolution of Business Email Compromise

The Evolution of BEC

That Nigerian prince has finally grown up.  Business Email Compromise or BEC is a real and evolving threat.  It may have started with humble beginnings but has been continually evolving.  Attackers are leveraging a remote workforce and COVID-19 to continue to exploit businesses.  Here’s what to look out for in 2021. Money Transfer Requests Accounting […]

How to Prevent the Easiest Hack in History

Fran Finnegan

Yahoo Finance published an article a few days ago about Fran Finnegan.  You can read the whole thing here.  The article details how Fran’s business got attacked and infected with ransomware, which essentially shut down his entire business for an undetermined period.  It’s written sympathetically and talks about what a terrible problem attacks like this […]

Print Nightmare

Nightmare

A new security vulnerability that has been nicknamed “Print Nightmare” has been making a big splash in IT security communities.  The exploit has been deemed a zero-day attack as there was no patch available when it was discovered.  The bug is dangerous enough that Microsoft issued a statement on it and released a patch out […]

Patch Your Apple Products Now!

In the last couple of days, it has come to light that Apple products including macOS, iOS, iPadOS, and watchOS have been hit with 4 different zero-day drive by attacks.  This puts users at significant risk, and it’s recommended that they update immediate with the patches that Apple has made available. Nature of the Attacks […]

Kaizen and Network Security

Our founder Phil Robinson loves improving processes.  He talks frequently about Kaizen, which is a Japanese term meaning “change for the better” or “continuous improvement”.  The idea is that as an organization i.t.NOW is continually working to refine its processes to improve the value and experience we deliver to our clients. We also have a […]