Setting Recovery Time Objectives That Fit Your Business

Setting Recovery Time Objectives (RTO)

With ransomware and network hacks on the rise, data backup and recovery has never been more important. But how do you know what backup and recovery objectives you should set for your business? After all, the more frequently you back up, the higher your DBR and data storage costs. In this post, we’ll walk you…

Read More

DearCry Ransomware & Why You Should Be on the Cloud

DearCry Ransomware & Cloud Computing

If your IT team hasn’t already moved you off an on-premises Microsoft Exchange Server into Exchange Online or at least very strongly recommended it, it’s time to start asking some hard questions. Even before the HAFNIUM zero-day infiltration into on-premises MS Exchange Servers was discovered, a large number of businesses had already moved to MS…

Read More

Using On-Premises Microsoft Exchange Server Software? Protect Your Data TODAY

Zero Day Microsoft Exchange Server Hack

If your company still has an on-premises Microsoft Exchange Server, your environment is at risk. Microsoft announced critical vulnerabilities requiring immediate patches released March 2, 2021 and is urging users to download software patches for the four vulnerabilities that were discovered. In addition, the DHS Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 21-02…

Read More

Multi Factor Authentication: What the Microsoft MFA Warning Really Means

Microsoft MFA (Multi-Factor Authentication)

You may have seen the recent Microsoft MFA warning and been a bit confused. After all, multi-factor authentication (MFA), also known as two-factor authentication (2FA) or two-step verification, is considered a cornerstone of good cybersecurity practice. In fact, last year Microsoft said that users who enabled multi-factor authentication could block around 99.9 percent of automated…

Read More

Download the Ransomware Response Checklist 2021

Ransomware Rapid Response Checklist

Would you know what to do if you fell victim to a ransomware attack? Download this free printable checklist. The Ransomware Response Checklist covers: Rapid response measures Analysis-based measures Business continuity measures Preventing future attacks And more! This simple one-pager is a great resource for the office. Print it and post it in a common…

Read More

Cybersecurity for Municipalities: Making Yourself a Difficult Target

Cybersecurity for Municipalities

As a cyber security expert and a city mayor, Intrust IT’s own Dave Hatter is in a unique position to share insights on cybersecurity for municipalities. Even before the COVID-19 crisis increased ransomware attacks, municipalities were prime targets. Atlanta and Baltimore are just two municipalities that had to pay hefty ransoms because their data was…

Read More

What the Chinese Network Equipment Ban Means for Your Business

Chinese Network Equipment Ban

The battle to ban Chinese network equipment and Chinese IT equipment is ongoing and not likely to be resolved quickly. As of the moment, there is a ban in place but it is being challenged by some states and the legal process can take years. So what does that mean for your business? What Is…

Read More

Can’t Text or Make Calls? It Could Be SIM Jacking

SIM Jacking

You’ve probably experienced the frustration of a smartphone that suddenly dies; usually following a hard drop or software update. But what if only part of it stops working, like the ability to make phone calls and send texts? The problem might not be your phone at all, but cyberthieves who’ve stolen your phone’s identity through…

Read More

Edge vs Chrome: What Is The Safest Browser?

Edge vs Chrome, What is the Safest Browser?

What is the safest browser? Is there even a difference? When was the last time you thought about your browser?  Most people don’t. They use whatever came with their computer (or smartphone or tablet). Or, maybe they tried a bunch of different ones years ago, picked one they liked and stuck with it. But the…

Read More