Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

it compliance

The 3 Pillars of IT Compliance: Practice, Documentation, Proof

These days, businesses of all sizes are concerned about IT compliance and regulations. The rise of ransomware attacks, data breaches, and subsequent litigation forces companies, non-profits, and government agencies to worry about what’s happening throughout their supply chain. Organizations that never worried such problems before are now suddenly receiving letters...
holiday phishing scams

Avoid These Holiday Phishing Scams

‘Tis the holiday season! It’s time for presents, family, and sadly, new holiday phishing scams. Recently, it was noted how phishing attacks form the spearhead to attack organizations. Key to blunting their effectiveness is educating your team about new types of fraud. As the holidays approach and to-do lists lengthen,...
April 2022 security patches

November Security Patches and Attacks You Need to Know About

While Microsoft and other vendors issue patches monthly, attackers provide daily reminders to address your vulnerabilities. As new attacks arise and software programs reach the end of their support, you need to make sure to stay current, protect your organization, and continue monitoring for malicious activity. These newest patches and...
Mobile devices and multifactor authentication

Why You Need to be Using Multi-Factor Authentication

You wouldn’t use your pet’s name for your password, right? And, of course, you know that using “password123456” is a bad decision. Now, you can add another bad practice to your list of “no-no’s.” The U.S. Cybersecurity and Infrastructure Security Agency (CISA) always maintains a Bad Practices Catalog of “exceptionally...
Cyberattacks continue to evolve in 2021

How Cyberattacks are Evolving in 2021

For the final week of Cybersecurity Awareness Month, there’s an important reminder: put cybersecurity first. Ideally, your organization adopts a secure philosophy. Unfortunately, widespread cybersecurity awareness still remains elusive for some. The full weight of protecting the organization falls often upon the IT security team, who must also make up...