The Outsource Your Worry Blog

Recent Blog Articles and News

Great reads on managed IT solutions, plus insider tips.
Shared Responsibility Model MS 365 Security

The Shared Responsibility Model & Microsoft 365

By Intrust Man | September 22, 2022

The shared responsibility model. You may have heard of it, but do you know what it is or what it means for your business? Before we jump in, there are a few things that you need to understand about your cyber security.  With more and more businesses using cloud services like Microsoft 365 (MS 365),…

Microsoft 365 vs Google Workspace

Microsoft 365 vs Google Workspace: Which Is Right For Your Organization?

By Chaim Black | September 15, 2022

Who wins the Microsoft 365 vs Google Workspace smackdown? Like many other decisions, the answer depends …  on the size of your organization, the type of industry, budget and, of course, your personal preferences. Here are some considerations to help you decide which cloud platform may work better for your organization. Before we dive in,…

How to stop unwanted emails.

How To Stop Unwanted Emails

By Tim Rettig | September 1, 2022

We all receive those pesky spam emails that crowd your inbox and make it difficult to organize. They can be newsletters from companies you may have signed up for and no longer want, spam mail, or even phishing emails sent by scammers trying to access your information. No matter the type, you can stop unwanted…

Improve Phishing Detection With The SLAM Technique

Prevent Phishing With The SLAM Technique

By Intrust Man | August 30, 2022

Phishing has become the top method cyber criminals use to attack companies, whether that’s hitting them with ransomware, breaching their databases,  stealing their credentials and more. It is one of the biggest cyber security threats to companies, so it’s crucial they learn methods of phishing detection.  What is Phishing? Phishing is a social engineering tactic…

Insider Threat Indicators and Prevention

Insider Threat Indicators and Prevention Tips

By Dave Hatter | August 24, 2022

We often think of cyber threats as coming from outside our company, or even from other countries — and that is often the case. However, there is another threat closer to home that many businesses ignore: threats from within their organizations. Known as insider threats, these can occur for many reasons. In today’s increasingly digital…

MDRs and MSSPs

MDRs Fill A Void Left by MSSPs

By Dave Hatter | August 18, 2022

You know cyber security is critical for your business, but just in case the alphabet soup of technology acronyms (like MDRs and MSSPs) is making your head swim, here’s a quick runthrough: MDR means managed detection and response. MSSP stands for managed security service provider. MSP is the abbreviation for a managed service provider. Not…

2022 Inc. 5000's List

Intrust IT on 2022 Inc. 5000’s List of Fastest Growing Companies

By Tim Rettig | August 18, 2022

CINCINNATI – Intrust IT, a cyber security and IT support company, has been named on the 2022 Inc. 5000’s prestigious annual list of fastest growing companies. For the fourth time, Intrust has ranked among America’s most successful and rapidly growing private businesses. Since its establishment in 1992, the IT company has been putting the “service”…

Cyber Attacks Rising

Cyber Attacks Are Rising, New Cyber Security Legislation

By Dave Hatter | August 11, 2022

The latest statistics from the Federal Bureau of Investigation (FBI) demonstrate that no industry is exempt from cyber attacks which are increasing in frequency and impact. Per the FBI, Business Email Compromise (BEC) attacks surpassed $43 billion globally and are rising. These losses, which the FBI calls “exposed losses,” include both actual and attempted losses…

Business Continuity Plan

A Leader’s Guide to Creating a Foolproof Business Continuity Plan (and Why It’s Important)

By Tim Rettig | August 4, 2022

Are you ready for a crisis?  Fire, flood, breach, ransom? If your business has been running smoothly, you might think you don’t need a continuity plan. You’ve been lucky. Most companies have had some sort of disruption that prohibits working. Those who have experienced disasters already know the benefit of having a continuity plan in…

Become an Insider

Get a monthly roundup of IT tips and stories.

In the Know

You have enough to think about: Take tech worries off your plate. The Outsource Your Worry Blog is our way of sharing news and developments with you. We delve into the latest updates in tech, sift through them and offer just what you need to know, when you need to know it. Some of the topics we’ve covered include disaster recovery, email phishing scams, password best practices, how to safely recycle computers and the cost of ransomware attacks. 

Watch this Outsource Your Worry Blog space regularly to find:

News on cyber security best practices you can follow. 

Tech issues explained in terms non-techies can understand. 

Updates on Intrust’s team and corporate happenings. 

Around Town

The team at Intrust IT gets around. You’ll find us (sometimes wearing orange suit jackets) offering our expertise at a number of events each month. Most often, we speak or join panels in the greater Cincinnati area, but we also present to meetings and conferences in farther-flung places. To find current events on our calendar, jump to this page. We hope to meet you in person and answer your tech questions.

If you’re looking for a speaker on topics like cyber security, IT innovation, Office 365 or cyber crime detection and prevention, contact us. We’d be interested in hearing about your event and presenter needs. 

Tim Rettig, Intrust IT CEO

Spread the Outsource Your Worry News

If you find a blog post here that you find particularly helpful or relevant to your business, we would love to have you share it. Our team is hyper-focused on customer service, so we are happy to share our knowledge as widely as possible. If you have a burning IT question that you would like to have us address, contact us to suggest it as a blog topic. And remember, for more news about Intrust IT,  you can follow us on Facebook, LinkedIn, Instagram, and Twitter.

The Outsource-Your-Worry Plan


Take tech off your plate in three easy steps:

Steps to Intrust IT Support: Schedule a time for us to meet (We’ll come to you)

1. Schedule a time for us to meet
(we'll come to you)

Steps to Intrust IT Support: Tell us your tech troubles and ambitions

2. Tell us your tech troubles and ambitions

Steps to Intrust IT Support: Partner with Intrust, outsource your worry and get back to your goals

3. Partner with Intrust, outsource your worry and get back to your goals