Blog posts, our latest Technology for Business Podcast episodes, & info on upcoming events

The Three Simple Ways to Harden Your Network

The Three Simple Ways to Harden Your Network The core of improving your cybersecurity readiness is to reduce exposure to the most common threats to individuals and systems.  This is referred to as “hardening your network”. Greatly Reduce Cybersecurity Risks Enable multi-factor authentication on all accounts. Access to websites and applications has long been protected […]

Work from Home Cybersecurity

Work from Home Cybersecurity The 4 Most Important Things You Can Do to Improve Security at Home October is National Cyber Security Awareness Month.  The CIT Security team has put together a few articles that will be shared throughout the month designed to help keep you informed about current threats and a few recommendations to […]

CIT is Minnesota’s Premier Cybersecurity Provider for Nursing Home Technology

CIT is Minnesota’s Premier Cybersecurity Provider for Nursing Home Technology One of the most common mistakes anyone can make when shopping around for cybersecurity is approaching information technology with a one-size-fits-all perspective. That is especially true for securing your nursing home’s sensitive information. After all, if cybersecurity protects information, wouldn’t all cybersecurity be the same? […]

Phishing and Spearphishing: Don’t Take the Bait

Phishing and Spearphishing: Don’t Take the Bait If you could just prevent your staff from clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented. As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one […]

Protect Your Business Against Hackers

Protect Your Business Against Hackers Locking up at the end of the workday makes sense—you want to protect your business. But what if locking your doors is not enough? How can you protect your business against hackers who can gain wide-open access to your back door? Your financial data, intellectual property and network information are […]

Putting people and productivity ahead of software or hardware. Let’s connect and make technology work for your business.