Social Media Security: If You Connect, Protect IT

Social Media Tricks (And How to Avoid Them)

So many of us connect to social media these days. Whether it’s to see photos of kids or grandkids who live on the other side of the country or it’s because we like to keep a pulse on health hints or even the latest jokes. But you might also be putting your cyber security at…

Read More

Cyber Trend Alert: Credential Stuffing and Credential Theft

Combat Credential Stuffing and Credential Theft

Cyber attacks are nothing new but unfortunately they’ve been growing at 450 percent since 2019. There are many types of these cyber attacks, but the most frequently successful ones are caused by stolen credentials, aka credential stuffing. The Colonial Pipeline breach was caused by credential stuffing. Learning the tools for combating these types of attacks…

Read More

Cloud Security Trends on the Rise: What They Mean for Your Business in 2022

Cloud Security Trends Business Implications 2022

As the world of technology evolves, so do cloud-based computing systems and cloud security trends. There was once a time when businesses scoffed at the thought of storing company information on something they couldn’t physically see or touch, but what about now?   The unbelievable expansion and widespread availability of cloud solutions have pushed virtually every…

Read More

Why You Need Endpoint Detection and Response (EDR): Next Gen AV

Endpoint Detection and Response (EDR)

You know by now that your cyber security comes down to far more than your antivirus (AV) software. But that doesn’t mean you shouldn’t stay up to date on the best AV solutions for business. Unless you are using the next generation antivirus: endpoint detection and response (EDR), aka endpoint threat detection and response, you’re…

Read More

Phishing Email Kit: How to Spot and Avoid Them

How to spot a phishing email kit

Here’s another watchout for your inbox: Scammers using a website to host a “phishing kit.” Through the kit, scammers send phishing emails with links pointing to a webpage created to mimic a real website and asking you to provide your password. This type of phishing email kit usually provides a login page, and when someone…

Read More

FBI Issues Russian Ransomware Attacks Warning: Is Your Business Protected?

FBI Warns of Russian Ransomware Attacks

Are you in position to protect your business from the threat of ransomware? Intrust, an IT managed services provider, can help you proactively protect your organization from cyber threats including Russian ransomware attacks.  The Russian invasion of Ukraine has prompted the U.S. government, along with European officials, to issue sanctions designed to isolate Russia from…

Read More

Crypto Mining on Company Servers

Intrust IT explores crypto mining on company servers

Here at Intrust IT, we’ve seen an increase in crypto mining on company servers with new  and existing clients. Our vulnerability assessment can catch if employees are engaging in crypto mining on your company’s server. Let’s take a look at what it is, what the immediate effects are and the larger threat. What Is Crypto…

Read More

Active Invitation to Bid Phishing Alert

Invitation to Bid Phishing Alert Cincinnati

We have observed an active phishing actor who has been compromising many companies in the Cincinnati area. After compromising a user’s email account, the attacker has been observed to look for sensitive information in the mailbox and then send out a mass email from the victim’s account with a link pointing to a phishing site…

Read More

Are Your Cyber Security Essentials Covered? Get the Checklist

Business Cyber Security Essentials - Have You Pulled Levers_

Every year, cyber thieves get increasingly creative when it comes to stealing your data.  From the Colonial Pipeline to the attack on JBS Foods, last year’s cybercrime had significant impacts on the everyday consumer, not to mention businesses. Cybersecurity Ventures predicts that ransomware will cost its victims more around $265 billion (USD) annually by 2031.…

Read More

Dark Web Monitoring: Are YOU on the Dark Web?

Dark Web Monitoring

We know you’ve heard of the dark web, almost anyone with a computer or TV has. But few have actually seen it or know if their data is on it. If you are an Intrust client, no worries.  Dark web monitoring is part of the overall cyber security we provide your business.  The dark web…

Read More