Dark Web Monitoring: Are YOU on the Dark Web?

Dark Web Monitoring

We know you’ve heard of the dark web, almost anyone with a computer or TV has. But few have actually seen it or know if their data is on it. If you are an Intrust client, no worries.  Dark web monitoring is part of the overall cyber security we provide your business.  The dark web…

Read More

Ransomware as a Service (RaaS): Cybercrime, No Hacking Skills Needed

Ransomware as a Service easy as pushing a button

We’ve said it before: Cybercriminals are smart — so smart they’ve now branched out to Godfather villainy much the same as a cartel. They’ll make you an offer you can’t refuse, a ransom threat, but they don’t necessarily need the wherewithal to do it themselves. They hire “hit men” — companies, groups, nefarious entities  —…

Read More

The Key To Business Resilience: Get Your DBR In Shape

Business Resilience

Business resilience means making sure your business can survive anything that comes at it, from supply chain issues to a ransomware attack (and everything in between). As a managed service provider, we have a great deal of experience helping companies improve their business resilience through Data Backup Recovery (DBR) planning. If you are working to…

Read More

Keeping Your Company and Your Identity Safe Online

Keep Your Identity Safe Online

Intrust’s cybersecurity pro, Dave Hatter, appeared on Local 12 this week to talk about the importance of keeping your identity safe online. Dave explained it’s important to understand that bad guys want your information because, “it makes it possible for them to impersonate you. Whether that’s trying to file for fraudulent credit, trying to get…

Read More

NSA and CISA Publish Ad Blocker Recommendations

Expert Ad Blocker Recommendations

Ad blockers protect those who use them from ads that could potentially hack their devices and access their sensitive information. Even federal organizations like the NSA and U.S. Intelligence Community agencies like the FBI, DEA, DHS and DoD utilize ad blockers similarly. The NSA and CISA published their ad blocker recommendations and why ad-blocking technology…

Read More

Cyber Security Measures vs. Productivity: Who Wins?

Cyber Security Measures

If you feel like you are in a battle with your cyber security team to get access to the files and systems you need to get work done, you’re not alone. It unfortunately happens far too often that security comes at the cost of productivity. But it IS possible to create and maintain your cyber…

Read More

Talk Like a CIO: IT Jargon and IT Terminology Updates

IT Jargon and IT Terminology

Technology terms are like a revolving door. Once you get the hang of one, the door rotates and something else needs to be learned. Sometimes it is difficult to keep up with IT jargon and terminology. IoB? Distributed cloud? Open source? Knowing what they mean is important, especially when you talk with your IT service…

Read More