2021 Password Best Practices Passwords – Is mine strong enough? How do I know? Every time I write a password article I feel as if this subject has already been done to death by me and others. But I always get more positive feedback on this subject than others I consider more interesting, so […]
About M L
This author has yet to write their bio.
Meanwhile lets just say that we are proud M L contributed a whooping 10 entries.
Information Security Policy: But Why? The word POLICY alone inspires a wince just reading it! A policy is the ‘how to’ and “what to do’, for specific individuals or groups. No one likes being told what to do or how to do it, right? When it comes to protecting assets, a policy is critical. Since […]
Prepare For and Prevent Ransomware Attacks Ransomware attacks, such as CryptoLocker, CyrptoWall, Locky, Chimera, Zepto, and the like, have become one of the best money-making exploits for cyber-criminals, with new variants appearing on the scene every month. These attacks usually start with a phishing email and a ZIP file attachment or a malicious link, so […]
Cybersecurity for Government Agencies – The Ultimate Guide Cyber threats to government agencies are increasing in volume and sophistication, making it very difficult to keep up with the ever-changing cybersecurity needs and strict compliance mandates required of government agencies. More than ever, our economic vitality, national security, and even our daily lives depend on a stable, safe, and resilient […]
Cybersecurity for the Manufacturing Industry It is not often we can pinpoint an exact sea change for trends in cybersecurity, but the manufacturing industry experienced an IT security awakening in 2010. It was September to be exact, when the Stuxnet computer worm, the first malware to attack real-world devices such as centrifuges and other machinery, was […]
Do You Have a Virus Running? You’d Better Go Catch It! The world of cybersecurity is constantly changing. 230,000 new malware samples are produced every day. It can seem like a daunting challenge to keep up with and monitor your devices for new and adapting malicious software (“malware”). However, there are some basic signs and […]
The Three Simple Ways to Harden Your Network The core of improving your cybersecurity readiness is to reduce exposure to the most common threats to individuals and systems. This is referred to as “hardening your network”. Greatly Reduce Cybersecurity Risks Enable multi-factor authentication on all accounts. Access to websites and applications has long been protected […]
Work from Home Cybersecurity The 4 Most Important Things You Can Do to Improve Security at Home October is National Cyber Security Awareness Month. The CIT Security team has put together a few articles that will be shared throughout the month designed to help keep you informed about current threats and a few recommendations to […]
Phishing and Spearphishing: Don’t Take the Bait If you could just prevent your staff from clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented. As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one […]
Protect Your Business Against Hackers Locking up at the end of the workday makes sense—you want to protect your business. But what if locking your doors is not enough? How can you protect your business against hackers who can gain wide-open access to your back door? Your financial data, intellectual property and network information are […]
We Put People First
We are CIT – a people-first I.T. company that cares about how you use technology, not just the technology itself. Discover how we’re different.