Posts by Tim Rettig
Still on the Job for Our Clients
Like everyone else, Intrust IT is responding to the corona virus outbreak. We know that your business continuity depends on our business continuity. As of this week, COVID-19 has not impacted Intrust’s operations. In an abundance of caution to keep our operations intact and reduce the spread in our community, we have enacted our business…
Read MoreEmail Phishing Scam Targets Shark Tank Host
Recently, you may have seen on the news that businesswoman and Shark Tank television show host, Barbara Corcoran, was a victim of an email phishing scam of approximately $380,000. Luckily for her, there was a happy ending: Corcoran’s bank was able to freeze the wire and prove it was a scam before the money was…
Read MoreYou Can’t Hide Your Company’s High Cyber Security Risk Level Anymore
Until a few years ago, if your company’s cyber security risk was high, the worst thing that might happen was an annoying computer virus might cause your computer to run slowly until you removed it. Over the past several years that “worst case scenario” of having a high cyber security risk has changed drastically. Now…
Read MoreHow Often Should Small Business Cyber Security Be Checked?
How often should small business cyber security be checked? At a minimum, most small businesses should be checking it annually. If your company has compliance requirements, it should be checked quarterly or even more frequently. If your infrastructure or software changes frequently, is complicated, or if you are a popular target for an attack, like…
Read MoreComparing Business Plans for Office 365 for Your Small Business
It can be difficult to compare business plans for Office 365 for any business. Office 365 helps businesses manage data, share files and improve team collaboration. With the different Office 365 plans available on the market, how can you make sure that your small business will get its money’s worth? Here are some compare business…
Read MoreThree Reasons Why Intrust Still Recommends Password Vaults
In 2015, LastPass announced that its online systems had been compromised and cyber criminals were able to access certain user information. For password vaults, this is big news because LastPass is a very popular vault that many people use to store all of their passwords. LastPass is one of the four solutions that we at…
Read MoreWeighing the Pros and Cons of Employee Monitoring Online
The choice to monitor your employees’ computers is a tricky one. While it may seem unethical to some, it could save you hours of lost productivity or prevent a data breach. Here are some pros and cons of employee monitoring, and some tips to handle it fairly if you decide it’s right for your business.…
Read MoreCyber Security for Small Businesses and Midsize Businesses, Too
Some small- and mid-sized businesses feel that they fly under the cyber-criminal radar. Sadly, the opposite is true. Cyber security for small businesses is more important than ever as they are prime targets of cyber criminals. Given the frequency, complexity and increasing number of threats, a multi-level, agile and cutting-edge cyber security strategy is the…
Read MoreIs Your CEO a Fraud? Business Email Compromise and What to Do About It in 2019
Chances are your CEO isn’t a fraud. But, the email in your inbox that looks like it is from your CEO really might be. The FBI calls this cyber threat, “business email compromise.” Some others call it “CEO fraud.” A single incident can cost a small company tens of thousands of dollars. As cyber security…
Read More