Business
Focused
Technology

360Advisor - Page 2 of 8 - IT360

Cyber Insurance Renewal and Risk

As many business owners know, cyber insurance coverage can be difficult to navigate, but it’s also getting increasingly difficult to secure. Organizations of all sizes now face a greater number of sophisticated cyber threats, and must defend a blurrier network security perimeter, with many employees working some from remote locations, using work and personal devices […]

Posted: February 9, 2022 | View More »

Payment Fraud Moves to the Real World with Fake QR Codes on Parking Meters

Scammers are using the professional-looking stickers to point those parking to an alternate pay site to collect credit card details in the perfect situation where victims would be none the wiser. This is a pretty slick scam – you park your car, don’t have enough change, see the “Pay Here” QR Code, scan it, and […]

Posted: February 9, 2022 | View More »

U.S. Government Warns of More Cyberattacks Targeting Critical Infrastructure

A new joint cybersecurity advisory from CISA, the FBI, and the NSA cautions organizations against Russian-based attacks and provides mitigations to be implemented. It’s one thing to see an advisory that simply says “hey, we’re seeing bunch more attacks.” But when you also see 8 pages of recommended security measures and a statement encouraging “the […]

Posted: February 9, 2022 | View More »

What is Penetration Testing and Why Does it Matter?

Penetration Testing (also called Pen Testing or Ethical Hacking) is a process by which your network is subjected to attempts to hack into it in order to identify vulnerabilities that could open your company up to data breaches. This is an audit that provides a point-in-time analysis, along with a report on the security gaps […]

Posted: November 17, 2021 | View More »

Five Signs of Social Engineering

Social engineering can come in many different forms: via email, websites, voice calls, SMS messages, social media and even fax. If it is a communication method, scammers and criminals are going to try to abuse it. Although the communication’s method may vary, the message the scammer is trying to convey has five traits in common. […]

Posted: October 13, 2021 | View More »

79% of Employees Have Knowingly Engaged in Risky Online Activities in the Past Year

With employees not believing that it’s important to personally worry about cyber security risks, they also tend to believe they’re not a target, new data suggest as the reason for the risky behavior. In most cyberattacks, the employee plays some role – clicking on a malicious attachment, giving up their corporate credentials to an impersonated […]

Posted: August 16, 2021 | View More »

80% of Ransomware Victim Organizations Experience a Second Attack

The impact of ransomware attacks is much more than just the sensationalized cost of ransoms. New data spells out how victim organizations have suffered at the hands of ransomware. With the future of ransomware looking pretty bleak, it’s important for organizations like yours to have a realistic understanding of just how impactful a single successful […]

Posted: August 16, 2021 | View More »

Ransomware Attacks This Year Are Already Higher Than 2020

According to the 2021 Cyber Threat Report by SonicWall, 304.7 million ransomware attacks occured in the first half of 2021, already surpassing the total number of ransomware attacks for all of 2020 with 304.6 million (a 151% increase YTD). The increase in ransomware attacks are due to the shift to remote work, allowing threat actors […]

Posted: August 16, 2021 | View More »

Choosing a Cybersecurity Approach

In the first part of this series released on Tuesday, we set the stage for present-day ransomware attacks. These professional enterprises have developed (and continue to improve upon) automated technology that increases their reach and depth of attacks. Businesses can no longer take a wait-and-see approach or keep kicking the cybersecurity can down the road. […]

Posted: July 22, 2021 | View More »

Ransomware Attacks Aren’t Just for Big Companies

While millions of Americans were celebrating a long Independence Day weekend, something sinister was happening behind the scenes. Considered to be one of the largest ransomware attacks ever, more than 1,000 businesses worldwide were suddenly locked out of their own IT systems with demands to pay up to $5 million each to regain access to […]

Posted: July 19, 2021 | View More »

Partner, Law Firm

We hired IT360 as our computer hardware and software computer consultants when the company first went into business. Since then, they have helped us purchase new software and hardware equipment that we have instituted into the law firm. Any time we needed them to be there they have been. They have solved all of our problems including: stand alone computers, networking issues, Internet access issues, and software. I would highly recommend IT360 to anybody who needs help in these areas.

Partner, Law Firm

Recent
Technology News

IT 360 News
Impersonation Phishing Attacks Increase as Credentials Take the Lead as the Primary Target

New data shows an upswell of email-based cyberattacks, with over 256 brands being impersonated, as social media, Microsoft, shipping, and ecommerce brands top the list. There’s been a lot of changes in the volume of email-based cyberattacks, according to security analysts at Abnormal Security. According to their H2 2022 Email Threat Report, the number of […]

Read more
IT 360 News
Crafty Microsoft USB Scam Shows the Importance of Security Awareness Training

Just when you thought scammers couldn’t get more tricky in their attacks, this example will prove you wrong. One of our KnowBe4 colleagues shared this LinkedIn post on a recent very crafty USB scam: As you can see, the Microsoft USB looks VERY similar to a USB you would receive from Microsoft in the mail as […]

Read more