Cyber Attacks Are Rising, New Cyber Security Legislation

Cyber Attacks Rising

The latest statistics from the Federal Bureau of Investigation (FBI) demonstrate that no industry is exempt from cyber attacks which are increasing in frequency and impact. Per the FBI, Business Email Compromise (BEC) attacks surpassed $43 billion globally and are rising. These losses, which the FBI calls “exposed losses,” include both actual and attempted losses…

Read More

Why You Need 24/7 Endpoint Monitoring

24/7 Endpoint Monitoring

Criminals are working around the clock. Your security  monitoring should, too. Cyber attacks most commonly take place during hours of the day when systems are not always being monitored: holidays, weekends and overnight. That’s why it’s important to have 24/7 endpoint monitoring so that you’re covered, from your networks and servers all the way down…

Read More

Download the Ransomware Response Checklist 2022

Ransomware Response Checklist Download 2022

Would you know what to do if you fell victim to a ransomware attack? Download this free printable checklist. The Ransomware Response Checklist covers: This simple one-pager is a great resource for the office. Print it and post it in a common area, email it to the whole team and go over it in group…

Read More

Social Media Security: If You Connect, Protect IT

social media security image

So many of us connect to social media these days. Whether it’s to see photos of kids or grandkids who live on the other side of the country or it’s because we like to keep a pulse on health hints or even the latest jokes. But you might also be putting your cyber security at…

Read More

Cyber Trend Alert: Credential Stuffing and Credential Theft

Combat Credential Stuffing and Credential Theft

Cyber attacks are nothing new but unfortunately they’ve been growing at 450 percent since 2019. There are many types of these cyber attacks, but the most frequently successful ones are caused by stolen credentials, aka credential stuffing. The Colonial Pipeline breach was caused by credential stuffing. Learning the tools for combating these types of attacks…

Read More

Cloud Security Trends on the Rise: What They Mean for Your Business in 2022

Cloud Security Trends Business Implications 2022

As the world of technology evolves, so do cloud-based computing systems and cloud security trends. There was once a time when businesses scoffed at the thought of storing company information on something they couldn’t physically see or touch, but what about now?   The unbelievable expansion and widespread availability of cloud solutions have pushed virtually every…

Read More

Why You Need Endpoint Detection and Response (EDR): Next Gen AV

Endpoint Detection and Response (EDR)

You know by now that your cyber security comes down to far more than your antivirus (AV) software. But that doesn’t mean you shouldn’t stay up to date on the best AV solutions for business. Unless you are using the next generation antivirus: endpoint detection and response (EDR), aka endpoint threat detection and response, you’re…

Read More

Your Money or Your (Company’s) Life? Avoiding a Ransomware Attack

Avoiding Ransomware attack at Your Company

Ransomware is a growing billion-dollar business and hackers have launched high-profile ransomware attacks against nearly every industry from healthcare to higher education to financial services, often with large ransoms and huge restoration costs. Even cities aren’t immune: Baltimore estimates cost of a crippling ransomware attack at $18.2 million. Yes, you read that right, $18.2 million!…

Read More

Crypto Mining on Company Servers

Intrust IT explores crypto mining on company servers

Here at Intrust IT, we’ve seen an increase in crypto mining on company servers with new  and existing clients. Our vulnerability assessment can catch if employees are engaging in crypto mining on your company’s server. Let’s take a look at what it is, what the immediate effects are and the larger threat. What Is Crypto…

Read More

Ransomware as a Service (RaaS): Cybercrime, No Hacking Skills Needed

Ransomware as a Service easy as pushing a button

We’ve said it before: Cybercriminals are smart — so smart they’ve now branched out to Godfather villainy much the same as a cartel. They’ll make you an offer you can’t refuse, a ransom threat, but they don’t necessarily need the wherewithal to do it themselves. They hire “hit men” – companies, groups, nefarious entities  –…

Read More