Posts by Tim Rettig
Multifactor Authentication: There’s No Cyber Security (Insurance) Without It
If you are in the market for cyber insurance, be prepared to document your multifactor authentication (MFA) policies and procedures. That’s because insurance companies are starting to require MFA to issue cyber insurance policies. In a recent flyer to its customers, Travelers Insurance, noted, “99.9 percent of account compromise attacks can be blocked by MFA.…
Read More10 Signs It’s Time to Switch Providers
When it comes to managed IT support and supplemental IT services, there are a wide range of IT providers out there-and they are far from equal. So, it’s frustrating to see businesses settle for IT support that doesn’t meet their needs simply because they’re scared to switch. Yes, switching takes a little effort and time.…
Read MoreWhy Intrust IT Doesn’t Lock In Your Company, Has No Long-Term Contracts
One thing we despise at Intrust IT is long-term contracts. The business environment changes fast, so we need our vendors and partners to be able to adapt and change to keep up. I’m sure your company feels the same way, so unlike all of our competitors, Intrust IT has no long-term contracts. You can change…
Read MoreCloud Computing Advantages for Business
The importance of having your business in the cloud became very apparent when the stay-at-home orders slowly came down from state and local agencies in the first quarter of 2020. The immediacy of working from home created a mad scramble for many businesses to connect their workers in a safe and productive way. This gave…
Read More2020’s Worst Ransomware Attacks and Why Backups Should Lead the Protection in 2021
Imagine what would happen if: These “what if” moments were actual results of some of 2020’s worst ransomware attacks; with small businesses, municipalities, schools and health care organizations among the hardest hit. We may not have read about these situations because they draw little news interest compared to some mega company like Microsoft being hacked.…
Read More6 Steps to Better Cyber Security Management for Your Business
From time to time, I give seminars called Cybersecurity in the Real World that provide attendees with steps to improve their personal cybersecurity. But the tactics I teach apply to businesses as well, and are a great starter set for businesses trying to improve their cyber security management. Step 1: Stay Up to Date Keep…
Read MoreCybersecurity vs Cyber Security? Either Way, You Need to Have It
Do you remember the old Gershwin song, a duet performed by Louis Armstrong and Ella Fitzergerald: “You say tomato, I say tomahto, you say potato, I say potahto…”? When it comes to IT services, it’s cybersecurity vs cyber security that makes a ruckus.
Read MoreThrow Pillow as Disease Vector? Returning to Work After COVID
With coronavirus restrictions lifting, many people are venturing back to the office. Understandably, some are concerned about the safety of returning to work after COVID. Here are some of the changes you might consider in terms of office technology and layout. Toss the Throw Pillow For years, offices have been shifting to more casual, open…
Read MoreYou’ve Got (Less) Mail! 6 Email Productivity Tools
Email is kind of like a new puppy: At first it’s fun that the puppy needs you and wants your attention, but pretty soon he can start to feel like a major distraction that keeps you from getting anything done. Unlike puppies, email can be brought under control with online tools. Here are six effective…
Read MoreSingle Sign-On: The Only Security Improvement Users Actually Like!
Nine times out of ten, when you improve cyber security, things get more difficult for users. It won’t be long before users will need to use a 67-character password with letters, numbers and gang signs. Oh, and they will have to change it at every login. Luckily, there is one thing you can do to…
Read More