Business
Focused
Technology

CYBERSECURITY TIPS FOR TRAVELERS


In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling—whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. The more we travel, the more we are at risk for cyberattacks. #BeCyberSmart and use these tips to connect with confidence while on the go.

Before You Go

While You Are There

Download PDF

Source: https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019

Mark Pugh

Director of Operations, Indianapolis

Mark Pugh is currently Director of Indianapolis Operations for Peoria based IT360, Inc.  He is a US Air Force veteran who has spent the last 35 years working with computer and information technology in its many forms over the years, including cyber security,  Instrumental in 3 startups since 1995, he was awarded Key Technical Contributor by INITA as part of its Million Dollar Awards in 1999. Most recently Mark ran his own startup Managed Service Provider which recently merged with IT360 in 2018.

Principal Owner, Law Firm

Our law firm uses IT360, Inc. for all of our technology needs. They not only provide outstanding service at a reasonable fee, but we consider them an integral part of our practice.

Principal Owner, Law Firm

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more