Posts by Dave Hatter
Cyber Attacks Are Rising, New Cyber Security Legislation
The latest statistics from the Federal Bureau of Investigation (FBI) demonstrate that no industry is exempt from cyber attacks which are increasing in frequency and impact. Per the FBI, Business Email Compromise (BEC) attacks surpassed $43 billion globally and are rising. These losses, which the FBI calls “exposed losses,” include both actual and attempted losses…
Read MoreWhy You Need 24/7 Endpoint Monitoring
Criminals are working around the clock. Your security monitoring should, too. Cyber attacks most commonly take place during hours of the day when systems are not always being monitored: holidays, weekends and overnight. That’s why it’s important to have 24/7 endpoint monitoring so that you’re covered, from your networks and servers all the way down…
Read MoreDownload the Ransomware Response Checklist 2022
Would you know what to do if you fell victim to a ransomware attack? Download this free printable checklist. The Ransomware Response Checklist covers: This simple one-pager is a great resource for the office. Print it and post it in a common area, email it to the whole team and go over it in group…
Read MoreSocial Media Security: If You Connect, Protect IT
So many of us connect to social media these days. Whether it’s to see photos of kids or grandkids who live on the other side of the country or it’s because we like to keep a pulse on health hints or even the latest jokes. But you might also be putting your cyber security at…
Read MoreCyber Trend Alert: Credential Stuffing and Credential Theft
Cyber attacks are nothing new but unfortunately they’ve been growing at 450 percent since 2019. There are many types of these cyber attacks, but the most frequently successful ones are caused by stolen credentials, aka credential stuffing. The Colonial Pipeline breach was caused by credential stuffing. Learning the tools for combating these types of attacks…
Read MoreCloud Security Trends on the Rise: What They Mean for Your Business in 2022
As the world of technology evolves, so do cloud-based computing systems and cloud security trends. There was once a time when businesses scoffed at the thought of storing company information on something they couldn’t physically see or touch, but what about now? The unbelievable expansion and widespread availability of cloud solutions have pushed virtually every…
Read MoreWhy You Need Endpoint Detection and Response (EDR): Next Gen AV
You know by now that your cyber security comes down to far more than your antivirus (AV) software. But that doesn’t mean you shouldn’t stay up to date on the best AV solutions for business. Unless you are using the next generation antivirus: endpoint detection and response (EDR), aka endpoint threat detection and response, you’re…
Read MoreYour Money or Your (Company’s) Life? Avoiding a Ransomware Attack
Ransomware is a growing billion-dollar business and hackers have launched high-profile ransomware attacks against nearly every industry from healthcare to higher education to financial services, often with large ransoms and huge restoration costs. Even cities aren’t immune: Baltimore estimates cost of a crippling ransomware attack at $18.2 million. Yes, you read that right, $18.2 million!…
Read MoreCrypto Mining on Company Servers
Here at Intrust IT, we’ve seen an increase in crypto mining on company servers with new and existing clients. Our vulnerability assessment can catch if employees are engaging in crypto mining on your company’s server. Let’s take a look at what it is, what the immediate effects are and the larger threat. What Is Crypto…
Read MoreRansomware as a Service (RaaS): Cybercrime, No Hacking Skills Needed
We’ve said it before: Cybercriminals are smart — so smart they’ve now branched out to Godfather villainy much the same as a cartel. They’ll make you an offer you can’t refuse, a ransom threat, but they don’t necessarily need the wherewithal to do it themselves. They hire “hit men” – companies, groups, nefarious entities –…
Read More