At CIT we’re all about getting clients in touch with the right people at the right time. You can check here often and get to know the people who make technology work for people.
Three simple ways to harden your network
Three simple ways to harden your network… The core of improving your cybersecurity readiness is to reduce exposure to the most common threats to individuals and systems. This is referred to as “hardening your network”. A few items of note that will greatly reduce cybersecurity risks include the use of an additional form of authentication, […]Read more
Information Security Policy – But WHY?
Information Security Policy – But WHY? The word POLICY alone inspires a wince just reading it! A policy is the ‘how to’ and “what to do’, for specific individuals or groups. No one likes being told what to do or how to do it, right? When it comes to protecting assets, a policy is critical. […]Read more
Security at Home
The 4 most important things you can do, to improve security at home October is National Cyber Security Awareness Month. The CIT Security team has put together a few articles that will be shared throughout the month designed to help keep you informed about current threats and a few recommendations to help secure you and […]Read more
ALL I WANT FOR CHRISTMAS IS YOUR CREDENTIALS
October marks the beginning of the holiday shopping season as holidaymakers prepare for year-end festivities. This jolly season unfortunately brings with it a far less pleasant time of year – phishing season. Distracted organizations, charitable givers, and busy shoppers make prime targets for cyber attackers looking to weasel their way into your wallet. Phishing incidents […]Read more
Do You Have A Virus Running? You’d Better Go Catch It!
The world of cyber security is constantly changing. 230,000 new malware samples are produced every day. It can seem like a daunting challenge to keep up with and monitor your devices for new and adapting malicious software (“malware”). However, there are some basic signs and steps that will help protect your devices and your data […]Read more
CIT is Minnesota’s Premier Cybersecurity Provider for Nursing Home Technology
One of the most common mistakes anyone can make when shopping around for cybersecurity is approaching information technology with a one-size-fits-all perspective. That is especially true for securing your nursing home’s sensitive information. After all, if cybersecurity protects information, wouldn’t all cybersecurity be the same? We are glad you’re taking a moment to read this […]Read more
Protect Your Business Against Hackers
Locking up at the end of the workday makes sense—you want to protect your business. But what if locking your doors is not enough? How can you protect your business against hackers who can gain wide-open access to your back door? Your financial data, intellectual property and network information are all just as valuable as […]Read more
Pop quiz: How secure is your student educational data?
The dangers that cyber threats pose to our children have never been greater. For the schools that protect our children, and who store our student’s data, there is no child’s play in keeping our kids safe from cyber threats. Take this quick test below to see if your school and education networks are current with […]Read more
Prepare for Windows Server 2008 end of support
Extended support for Windows Server 2008 and Windows Server 2008 R2 ends January 14, 2020. Microsoft will no longer release security updates, which may expose you to security attacks or make you out of compliance with industry regulations such as GDPR. Avoid business disruptions and use this as an opportunity to modernize your application stack. […]Read more
Protect Your Privates
WHEN IT COMES TO CYBERSECURITY, WE HAVE THE ANSWERS. Cyber threats are increasing in volume and sophistication, making it very difficult for financial institutions to keep up with the ever-changing cybersecurity needs and strict compliance mandates. That’s why we partner with AlienVault™ to help those in the financial services industry comply with FFIEC cybersecurity guidelines […]Read more