Would you know what to do if you fell victim to a ransomware attack? Download this free printable Ransomware Response Checklist that covers: Rapid response measures Analysis-based measures Business continuity measures Preventing future attacks And more! This simple one-pager is a great resource for the office. Print it and post it in a common area,…

Read More
Cybersecurity for Municipalities

As a cyber security expert and a city mayor, Intrust IT’s own Dave Hatter is in a unique position to share insights on cybersecurity for municipalities. Even before the COVID-19 crisis increased ransomware attacks, municipalities were prime targets. Atlanta and Baltimore are just two municipalities that had to pay hefty ransoms because their data was…

Read More
Cyber IT Security

In this new course, we guide you through the cyber security steps you can take for your business in easy-to-follow, 3-minute videos. Start training. Can cyber IT security really be as easy as PIE? It can with a simple makeover! That’s what the new video course from Intrust IT in Cincinnati is all about. Here’s…

Read More
Cyber Security Tech Gift Ideas

Yup, it’s that time of year again and you’re wondering what to give to your employees. You could go the food route, or maybe get pens or flash drives or even portable hubs. But why not use the opportunity to show how much you value cybersecurity with one of these tech gift ideas: USB Data…

Read More
Cyber Security Management Steps

From time to time, I give seminars called Cybersecurity in the Real World that provide attendees with steps to improve their personal cybersecurity. But the tactics I teach apply to businesses as well, and are a great starter set for businesses trying to improve their cyber security management. Step 1: Stay Up to Date Keep…

Read More
SIM Jacking

You’ve probably experienced the frustration of a smartphone that suddenly dies; usually following a hard drop or software update. But what if only part of it stops working, like the ability to make phone calls and send texts? The problem might not be your phone at all, but cyberthieves who’ve stolen your phone’s identity through…

Read More