Tag Archives: IT Security

Security In The Cloud: Myths and Realities

So, you’ve been hearing a lot about cloud computing. If you’re anything like me, you’ve probably had a moment or two where you’ve wondered, “Is my data actually safe up there in the… well, cloud?” This is one of many cloud security myths that make businesses miss out on the capabilities that the right cloud […]

Dropping the Ball on Employee Onboarding/Offboarding – A Bad Look and a Cybersecurity Risk

Time to address one of the most notorious IT blunders that organizations fall victim to: the employee offboarding. Seems simple, right? “We have a user leaving… abruptly. We need their access cut off… quickly.” The combination of not defining what this means and the time sensitive nature of some of these requests is a perfect […]

Three Essential Cybersecurity Solutions for Small Businesses: Important Considerations 

Three Essential Cybersecurity Solutions

Most organizations make cybersecurity overly complicated because “you should do it either way.” This is not a valid argument. Business owners have tons of “have to” being thrown at them every day. It’s extremely difficult to cut through the fluff and identify what is critical and what is just nice to have. We take the […]

TikTok Security Concerns

Youth opening up tik tok on her phone

With the recent congressional hearing on TikTok security and data privacy rules, we thought we might take a slight deviation from our typical coverage to discuss a topic that is on a lot of lips.  Along with some comical moments that highlighted almost complete ignorance from several members of congress on how the internet works, […]

How To Send Encrypted Email in Outlook

It provider using encrypted email

There are a lot of business reasons why you may want to send encrypted email.  It could be sensitive financial data, or personal information about employees.  Maybe you work in healthcare and need to send personal health information that is protected by HIPAA.  There could be several other reasons.  There’s also not only one way […]

A Beginner’s Guide to Pen Testing

Pen test

Digital inclination has brought about a new wave of cybercrime, with cyberattacks increasing at an unprecedented rate. Statistics from Abnormal revealed that phishing had a growth rate of 48% from previous years as of June 2022.  Unfortunately, small and medium businesses (SMBs) are a common target for cybercriminals, accounting for 43% of cyberattacks in 2019 […]

Dangers of Connecting to Public Wi-Fi

free WIFI drawing on a side of a wall

We’ve been told for some time that there are dangers associated to connecting to free public Wi-Fi.  What are those dangers?  Could they put your data at risk?  We’ll look at a few of the most common threats associated with public Wi-Fi, and how to stay protected. MITM Attack One of the biggest dangers with […]

Security Alert: Growing Threats

Growing Threats

i.t.NOW works hard to protect our clients’ networks from security threats and ensure their safety and operability.  In those efforts we frequently see what growing threats there are in the wild.  Two that we particularly wanted to make our clients aware of are Business Email Compromise (BEC) attacks, and Ransomware. Neither one of these attacks […]

Hackers Using Evolving Attacks To Defeat MFA

Hackers Using Attacks To Defeat MFA

Multifactor Authentication has become a part of our modern world.  Its an essential part of a network security plan.  However, hackers are using evolving attacks to defeat MFA.  Let’s look at some of those attacks and see what can be done to protect against them. What is Multifactor Authentication? “Deploying MFA means you require more […]

The HOW and WHY of Cybersecurity Endpoint Attacks:  Why do they happen?

They how and why of cybersecurity are numerous and varied.  Here we’ll discuss endpoint attacks specifically, and some of the more common attack vectors.  We’ll also touch on a few primary ways to prevent these breaches, and why business owners should care. How are they getting in?  Here are several common attack types User Initiated […]