What Is an Insider Threat in Cyber Security?

insider threat faq

An insider threat in cyber security originates from someone who works in your organization or has inside access to your networks, such as a vendor, client or former employee. Insider threats account for an estimated one-third (33 percent) of all cyber attacks. This type of threat is becoming a growing concern, increasing as much as…

Read More

Don’t Be Fooled by These Social Engineering Threat Trends

social engineering threat trends

Social engineering is the primary cause of cyberattacks today, so it is critical to keep your team informed of the latest social engineering threat trends. Cyber thieves are leveraging these trends to directly commit fraud, harvest credentials or install malware.  Despite the best efforts of your company’s workers, cybercriminals continue to steal, defraud and ransom…

Read More

9 Phishing Scam Prevention Tips

9 Phishing Scam Prevention Tips

If you’ve been on the Internet or working at a desk job, you’ve likely heard the term “phishing” thrown around once or twice, but what does it mean? We’ll explain and provide nine phishing scam prevention tips so you can know what to do when you encounter a phishing email and the things to look…

Read More

8 Best Cloud Organization Tips (And Why You Should Use Them)

Cloud Organization Tips

The cloud makes it easy to share, store and manage files, but without routine maintenance, it can become messier than a department store on Black Friday. As a managed service provider, this isn’t our first rodeo. The good news is there are several best practices for cloud organization that you can use to streamline your…

Read More

Azure vs AWS: Which Should I Choose?

Azure vs Aws

The Azure vs AWS debate is a complex one to handle. You’re likely thinking about which cloud architecture of the two is right for your business.  Both platforms are well-established: Azure has been around since 2010 and AWS has been kicking since 2006. Azure was developed by Microsoft, while AWS was developed by Amazon. In…

Read More

Reply Chain Phishing Attacks: Protect Your Business

Reply Chain Phishing Attacks

Did you know that phishing is still the primary method for cyber attacks? Protecting yourself and your business from threats like reply chain phishing attacks is important to the health and viability of your business. For remote workers, cyber security is particularly critical in their day-to-day work.  With hackers getting more sophisticated, it can be…

Read More

Best Practices to Prevent Phishing Attacks

No cybersecurity techniques can prevent phishing or other types of cyber attacks if the end user doesn’t know best how to spot and prevent phishing attacks. That’s why training is essential to any cyber security program. Anti-phishing best practices require a combination of technical controls, employee education and incident response. Technical Controls to Protect End…

Read More

What is a zero day attack?

Zero Day Attack

A zero day attack is a cyber attack that takes advantage of an unknown or unpatched vulnerability for the first time. This could mean that the vulnerability is completely new and that no one was aware of it previously. Or, it could mean that the vulnerability was known, but there was no known way to…

Read More

Intrust IT’s Dave Hatter Speaking at ISACA’s November Chapter Meeting

Dave Hatter of Intrust IT Speaking at ISACA November Chapter Meeting

November Greater Cincinnati ISACA Chapter Meeting Dave Hatter of Intrust IT will be talking on the topic “Cyberinsurance, it’s a jungle out there…” focusing on the current state of this insurance, what’s required, with some real world stories on Tuesday, November 1 at 5:30PM. This event is a Hybrid Event (Online and in-person at Montgomery…

Read More

Best Practices to Avoid File Sharing Dangers

File Sharing Dangers and Best Practices

File sharing has long been a way to socialize with friends and family, especially sharing a photo of a sweet moment or memory. Everyone does it, whether on social media, through cloud platforms like Google photos, by email or even a text message. But sharing can give cyber criminals a key to your data: If…

Read More