Posts by Dave Hatter
What Is Two Factor Authentication, and Why Does It Matter?
You’ve likely seen security updates on your phone or computer asking you to set up 2FA or MFA to increase the security of your accounts. But what is two-factor authentication (2FA), and why does it matter? Our managed service provider experts are here to help you understand what 2FA and MFA are and how these…
Read MoreSecuring Our Cities: Cybersecurity Protection for Local Governments | February 28, 2024
Securing Our Cities: Cybersecurity Protection for Local Governments Join us online for an insightful and engaging discussion about cybersecurity that will help you protect your organization’s assets from the latest threats and bad actors. Date: February 28, 2024 Time: 8 – 9 a.m. Location: Virtual Webinar via Microsoft Teams Presenter Dave Hatter Mayor of Fort…
Read MoreLocal Government Security Breaches: Are City Officials Prepared?
Virtually every day there’s a new headline about novel cyber threats, government security breaches and municipal government cyber attacks that lead to theft of money, theft of data, and critical outages. While it’s tempting to bury your head in the sand, thinking “This will never happen to us,” we can tell you from decades of…
Read MoreEndpoint vs Shared System Backups for Disaster Recovery
When it comes to disaster recovery and managed IT services, the topic might not be the most exciting, but its impact on your business continuity is undeniable. Let’s explore two fundamental types of backup solutions: Endpoint vs shared system backups, and figure out how to choose the right fit for your business. Quick Scenario: A…
Read MoreSecuring Our Cities: Cybersecurity Protection for Local Governments | February 21, 2024
Securing Our Cities: Cybersecurity Protection for Local Governments Join us in person or online for an insightful and engaging discussion about cybersecurity that will help you protect your organization’s assets from the latest threats and bad actors. Date: February 21, 2024 Time: 8 – 9 a.m. Location: Intrust IT Headquarters9850 Redhill DriveCincinnati, OH 45242 The…
Read More5 Cybersecurity Myths
Subpar security is one of the biggest threats to businesses in today’s world. Understanding the importance of cybersecurity and debunking common cybersecurity myths is crucial in safeguarding your business from potential threats. Let’s take a closer look at some of the misconceptions and how to address them effectively. Myth #1: Cybersecurity isn’t my responsibility. Reality:…
Read MoreExploit vs Vulnerability: What’s the Difference?
In cyber security, it’s not uncommon to hear terms like “exploit,” “vulnerability,” “hacking” and “cracking” used interchangeably. But what is an exploit vs vulnerability, and what do these terms mean? As an expert managed service provider, we believe it’s essential to shed light on these terms, as clarity is the first step in protecting your…
Read MoreSocial Engineering Attacks: How They Work
We have good news and bad news. The bad news is cybercrime is on the rise, and cybercriminals get the valuable intel they use to breach your company via the cycle of social engineering attacks. The good news? You don’t have to be an expert on social engineering attacks to protect your business. Our expert…
Read MoreMicrosoft Office 365 vs 2016: Which Wins?
When it comes to comparing Microsoft Office 365 vs 2016, we understand how overwhelming the choices can be for your business. At Intrust IT, we’re your trusted managed IT and Microsoft 365 support partner, and we’re here to simplify this decision-making process for you based on our years of experience. Microsoft Office 365 vs 2016:…
Read MoreDon’t Be Fooled by These Social Engineering Threat Trends
Social engineering is the primary cause of cyberattacks today, so it is critical to keep your team informed of the latest social engineering threat trends. Cyber thieves are leveraging these trends to directly commit fraud, harvest credentials or install malware. Despite the best efforts of your company’s workers, cybercriminals continue to steal, defraud and ransom…
Read More