6 Tech Tools to Stop Using in 2023

6 Tech Tools Past Their Due Date in 2023 (1)

Technology is ever-changing. As new products emerge or innovations offer improvements on older ones, it’s no wonder many become obsolete or unusable. It’s hard to know which tech tools to stop using to enable your organization’s digital transformation. What may have been a popular tech tool in the past may now be vulnerable to cyberattacks…

Read More

Is It Time for a New IT Partner in 2023?

New IT partner

Threat actors have successfully harmed many small and medium-sized businesses (or SMBs) over the past several years. SMBs have had a wake up call. Many are finally getting the message that cybercriminals see smaller businesses with relatively low staff as easy targets because they often don’t invest in the right cyber security.  A recent survey…

Read More

What Are the Benefits of IT Service Management?

What Are The Benefits of IT Service Management - FAQ

IT service management benefits include: IT service management achieves the above benefits by: Aside from the benefits above, using an ITSM  provides solid day-to-day conveniences that better help your business run efficiently and effectively.   ITSM handles multiple issues, including solving recurring problems (i.e., “this application is stuck again”) and all service requests, whether they are…

Read More

What Is IT Service Management?

What is IT Service Management-FAQ

An IT service management (or ITSM) company uses a process to plan, support, create, deliver, operate and implement your IT technology to best serve you and your customers or clients. An ITSM’s scope of work covers all technology services and devices. Laptops and laptop applications, printers,  servers, all software applications and even your passwords. ITSMs…

Read More

What is a zero day attack?

Zero Day Attack

A zero day attack is a cyber attack that takes advantage of an unknown or unpatched vulnerability for the first time. This could mean that the vulnerability is completely new and that no one was aware of it previously. Or, it could mean that the vulnerability was known, but there was no known way to…

Read More

What is a vulnerability vs an exploit?

What is a vulnerability vs an exploit

There’s a simple way to remember what is a vulnerability vs an exploit. A vulnerability is a weak spot in an IT system or program. An exploit is the act of using that vulnerability to enter or compromise software or IT networks. You can’t have an exploit without a vulnerability but you CAN (and often…

Read More

5 Ways to Celebrate the Holidays With Remote Teams

Holidays With Remote Teams

The holiday season is fast approaching, and it’s the perfect time of year to show your appreciation for your virtual or hybrid teams. All it  takes is some creativity and your collaboration tools to celebrate the holidays with remote teams. Whether you Zoom, Slack or use Teams, the same cloud platforms that keep your team…

Read More

Intrust IT’s Dave Hatter To Join Manufacturing/​Distribution Roundtable

Manufacturing Distribution Roundtable November 2022

November Manufacturing/Distribution Roundtable Meeting Dave Hatter of Intrust IT and Lacy Rex of Oswald Companies will lead a Manufacturing/Distribution Roundtable discussion on Cyberinsurance November 15th from 4:00 pm to 6 pm at McCormick Equipment. November 15th at 4:00-6:00pmMcCormick Equipment112 Northeast Dr, Loveland, OH  45140 Agenda Discussion on Cybersecurity Cyberinsurance – led by Lacy Rex (Oswald…

Read More

Intrust IT’s Dave Hatter Speaking at ISACA’s November Chapter Meeting

Dave Hatter of Intrust IT Speaking at ISACA November Chapter Meeting

November Greater Cincinnati ISACA Chapter Meeting Dave Hatter of Intrust IT will be talking on the topic “Cyberinsurance, it’s a jungle out there…” focusing on the current state of this insurance, what’s required, with some real world stories on Tuesday, November 1 at 5:30PM. This event is a Hybrid Event (Online and in-person at Montgomery…

Read More