Business
Focused
Technology

Internet of Things


Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world.

Why Should We Care?

Simple Tips to Own It.

Download PDF

Source: https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019

Mark Pugh

Director of Operations, Indianapolis

Mark Pugh is currently Director of Indianapolis Operations for Peoria based IT360, Inc.  He is a US Air Force veteran who has spent the last 35 years working with computer and information technology in its many forms over the years, including cyber security,  Instrumental in 3 startups since 1995, he was awarded Key Technical Contributor by INITA as part of its Million Dollar Awards in 1999. Most recently Mark ran his own startup Managed Service Provider which recently merged with IT360 in 2018.

We are high speed and wireless with computer systems for everything we do. I do not worry at all because it has not been an issue since IT360 became a part of our company.

President, Manufacturing Company

Recent
Technology News

IT360 News
‘New VPN Configuration’ Email Tricks Microsoft 365 Users Out of Credentials

Scammers are taking advantage of the prominent use of VPNs by remote workforces to send out this very topically relevant phishing email that just wants to steal your credentials. Nearly one-third of users utilize a VPN to access work-related sites and services. From a cybercriminal’s perspective, that’s a significant chunk of people they can target. The shift to remote […]

Read more
IT360 News
BEC Isn’t Back; It Never Left

Business email compromise (BEC) attacks aren’t new, but they’re growing increasingly effective, according to Zeljka Zorz at Help Net Security. Zorz cites an article from BakerHostetler, in which two attorneys describe how BEC attacks work and why they’re so effective. The lawyers explain that BEC attacks involve targeted phishing attempts coming from spoofed or compromised email […]

Read more