Welcome to our IT support blog posts. Bookmark this page to stay in the loop with our expert advice about IT and workplace security. Learn more about dealing with common challenges with Microsoft, Webex, cyber security and more.
Your Money or Your (Company’s) Life? Avoiding a Ransomware Attack
Ransomware is a growing billion-dollar business and hackers have launched high-profile ransomware attacks against nearly every industry from healthcare to higher education to financial services, often with large ransoms and…
Read MoreCrypto Mining on Company Servers
Here at Intrust IT, we’ve seen an increase in crypto mining on company servers with new and existing clients. Our vulnerability assessment can catch if employees are engaging in crypto…
Read MoreIs Hiring IT Staff an Uphill Battle? You’re Not Alone
If you are finding that hiring IT staff feels impossible, you are not alone. According to a recent Wall Street Journal article, there are a lot of IT job openings…
Read MoreCyber Security Company or IT Services Company: Which Best Protects Your Business?
Cyber security can be confusing and it’s difficult to know where to turn for help. There are many companies, software and tools available that claim to have the answer. As…
Read MoreDesktop as a Service (DaaS) and Virtual Desktops: Are They Right for Your Business?
One of our jobs as a managed service provider (MSP) is to help our clients understand new IT and whether or not it will work for their business. The latest…
Read MoreKeeping Your Company and Your Identity Safe Online
Intrust’s cybersecurity pro, Dave Hatter, appeared on Local 12 this week to talk about the importance of keeping your identity safe online. Dave explained it’s important to understand that bad…
Read MoreBuy Business IT Infrastructure Equipment Now for 2021 Tax Benefits
There’s a great tax benefit out there for anyone looking to upgrade their businesses IT infrastructure, but if you wait too long to make your purchases, you could miss out.…
Read MoreOffice 365 Mail Rules to Use for Anti-Spoofing
Fraudulent emails are becoming a common cyber threat. Anti-spoofing mail rules set up in Office 365 can help. In these phishing schemes, scammers research internal company names and send emails…
Read MoreTalk Like a CIO: IT Jargon and IT Terminology Updates
Technology terms are like a revolving door. Once you get the hang of one, the door rotates and something else needs to be learned. Sometimes it is difficult to keep…
Read MoreMultifactor Authentication: There’s No Cyber Security (Insurance) Without It
If you are in the market for cyber insurance, be prepared to document your multifactor authentication (MFA) policies and procedures. That’s because insurance companies are starting to require MFA to…
Read More