Business
Focused
Technology

360Advisor - Page 2 of 8 - IT360

Coronavirus Phishing Attacks Skyrocket to 30% Increase

Scammers riding the COVID-19 wave are adapting to new scenarios as the pandemic evolves. Checkpoint recently discovered that over 192,000 coronavirus-related phishing attacks per week over the past three weeks, a 30% increase compared to previous weeks. In the past three weeks, almost 20,000 new coronavirus-related domains were registered: 17% of these are malicious or […]

Posted: June 30, 2020 | View More »

Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer. We’ve written before about the various types of Zoom-related attacks that have sprouted up over the last two months. The latest chapter in this saga […]

Posted: June 30, 2020 | View More »

Remote Work Isn’t Good for Corporate Security (Part 2)

30% of Organizations Have Been the Victim of Phishing Scams Since the Lockdown Lots of new data is now just coming out of the woodwork demonstrating some of the harsh realities of having employees work from home without proper security in place. According to new data from software information hub Capterra, in their Remote Work […]

Posted: June 30, 2020 | View More »

Remote Work Isn’t Good for Corporate Security (Part 1)

6 in 10 Employee’s Online Accounts Have Been Compromised Since Working Remotely Working from home has its advantages. But, according to new data, one of them isn’t keeping the organization secure. Now that we’ve had some time to allow employees to work from home, security vendors have had time to quantify just how secure your […]

Posted: June 30, 2020 | View More »

Subscribe to our Newsletter

Posted: May 12, 2020 | View More »

CIJS Certified

it360 is now Certified to provide IT services for Police and Law Enforcement The CJIS Security Policy sets minimum security requirements for any organization accessing the data, as well as guidelines to protect the transmission, storage, and creation of criminal justice information (CJI) such as fingerprints, identity history, case/incident history, etc. The CJIS standards include […]

Posted: April 14, 2020 | View More »

Blackmail – A Message from IT360 President Don Dawson

I have received my share of emails that try to blackmail me into paying a sum of money to keep my network safe or my “secrets” from getting out (examples below).   These emails usually include one of your current or previous passwords in the subject line to get your attention. They go on to explain […]

Posted: April 14, 2020 | View More »

What is the “Customer Experience”?

Basically, it’s any and every interaction that you have with your customers – directly and indirectly. It’s the phone conversations, emails, invoices, service department, sales department, parts department, is the parking lot clean, is there clutter everywhere, did you make them go “wow”, did you make them become the expert in your services or product […]

Posted: April 14, 2020 | View More »

Requested Information

Print PDF Listed below are sections with some examples of the type of information that we are requesting. Providing as much of this information as possible will allow us to not only make Onboarding a seamless process, but ensures that we have all the information needed to work side by side with vendors on your […]

Posted: April 14, 2020 | View More »

Thank You

Your form was successfully submitted. Thank you for your referral.

Posted: April 14, 2020 | View More »

President, Transportation Company

Your technical support team has always been able to handle our needs quickly, efficiently, and patiently. We appreciate your timeliness and the hours you have saved us. It is great to know that we have people at IT360 capable to provide solutions to our problems.

President, Transportation Company

Recent
Technology News

IT 360 News
BEC Incidents Intent on Invoice or Payment Fraud Increase 155% Across All Industries

Business Email Compromise appears to be back in the saddle again, as attackers use simple social engineering and domain impersonation to trick victims into paying up. In the midst of adjusting to working-while-COVID, ransomware seemed to be at the forefront of attacks. But new data from Abnormal Security’s Q3 Quarterly BEC Report shows that business email compromise has recently grown in interest […]

Read more
IT 360 News
Thinking Skeptically About Smishing

Organizations need to train their employees to be on the lookout for SMS phishing (smishing), according to Jennifer Bosavage at Dark Reading. Bosavage explains that attackers exploit normal human behavior to gain access or information from employees. “Cyberattackers leverage the way people typically respond to certain social situations to trick them into disclosing sensitive information about themselves, […]

Read more