Microsoft Office 365 vs 2016: Which Wins?

Microsoft Office 365 vs 2016 - Which Wins

When it comes to comparing Microsoft Office 365 vs 2016, we understand how overwhelming the choices can be for your business. At Intrust IT, we’re your trusted managed IT and Microsoft 365 support partner, and we’re here to simplify this decision-making process for you based on our years of experience.  Microsoft Office 365 vs 2016:…

Read More

Don’t Be Fooled by These Social Engineering Threat Trends

social engineering threat trends

Social engineering is the primary cause of cyberattacks today, so it is critical to keep your team informed of the latest social engineering threat trends. Cyber thieves are leveraging these trends to directly commit fraud, harvest credentials or install malware.  Despite the best efforts of your company’s workers, cybercriminals continue to steal, defraud and ransom…

Read More

9 Phishing Scam Prevention Tips

9 Phishing Scam Prevention Tips

If you’ve been on the Internet or working at a desk job, you’ve likely heard the term “phishing” thrown around once or twice, but what does it mean? We’ll explain and provide nine phishing scam prevention tips so you can know what to do when you encounter a phishing email and the things to look…

Read More

LastPass Incident and Intrust’s Recommendation

UPDATED FEBRUARY 2023 In response to the LastPass incident, our team has evaluated several password managers. We now recommend 1Password to securely store your passwords because of the unique method it uses to encrypt users’ password vaults. 1Password is easy to use and can be used to store passwords, log in to sites and fill…

Read More

Best Practices to Prevent Phishing Attacks

No cybersecurity techniques can prevent phishing or other types of cyber attacks if the end user doesn’t know best how to spot and prevent phishing attacks. That’s why training is essential to any cyber security program. Anti-phishing best practices require a combination of technical controls, employee education and incident response. Technical Controls to Protect End…

Read More

Email Security Trends and Preventing Email-Borne Cyber Attacks

Email Security Trends

There’s a  good reason we talk about email security trends a lot in this blog and with our managed IT clients. In the past couple of years, cyber attacks by email have been growing to very high levels. FBI data shows record highs in ransomware attacks, business email compromise (BEC) and phishing in 2022. Our…

Read More

7 Business Cyber Security Tips for the Holidays

The holidays are a time of giving, but for hackers, it’s a prime opportunity to steal data and money. Companies are the most susceptible to these nefarious attacks, especially if they have limited resources set aside for business cyber security. To protect your company, customers and vendors, you should take steps to secure your network.…

Read More

Supply Chain Cyber Attacks Are On the Rise: How To Protect Your Company

supply chain cyber attacks

When it comes to cyber security, things are always changing, and technology is always growing or improving in one way or another. As a result of this, cyber attacks have been on the rise, attacks that can be particularly threatening to supply chain businesses. These supply chain cyber attacks can cause a number of problems…

Read More

Top Mobile Threats for You to Watch

Top Mobile Threats and Mobile Security Tips

Who would have thought that smartphones and tablets would become the preferred communication device for both personal and business use? It’s a rhetorical question to be sure, but it raises an important thought: Are these devices susceptible to mobile threats? Do they have mobile security? Our portable and relatively small devices can do anything a…

Read More

Matanbuchus Malware Uses Google Drive Link in Phishing Attack

Matanbuchus Malware Attack Uses Google Drive

Matanbuchus Malware Uses Google Drive Link in Phishing Attack You’ve probably never heard of Matanbuchus malware but you need to know about it and how it is using Google Drive and other legitimate infrastures to worm its way into your network. This cyber security risk first surfaced in February 2021, but recently, a cyber criminal…

Read More