70TB of user data stolen from now-defunct social media site Parler.
Does it feel like you’re getting an email update from everyone you’ve ever done business with about how their company is handling COVID-19? A spike in corporate email messages meant to keep customers informed has provided a valuable opening for bad actors to exploit as they mount new phishing attacks. The United States Secret Service recently released an Read more about MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY[…]
As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]
It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]
Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]
Maintaining compliance in today’s ever-changing environment is no easy task, particularly within the healthcare space. In the past, hackers opportunistically targeted providers due to poor security networks and infrastructure. Over time, however, cybercriminals have realized the true value of personally identifiable information (PII) and protected health information (PHI), which can be leveraged for identity theft, financial Read more about HIPAA 101[…]
Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New Read more about The NY SHIELD Act is Almost Here: How to Stay Compliant[…]
A quick glance at recent reports or news headlines paints a dismal picture of the data breach landscape in 2019. Both by the measure of the number of companies compromised and the number of records accessed, breach incidents are occurring at a record-setting pace, with over four billion records exposed for misuse and abuse this year. Read more about How to Stop Credential Stuffing Attacks[…]
A data breach is disastrous for any company in any industry, but the healthcare sector is an especially high-stakes arena where data security is of utmost importance and under continual attack. Few types of data are as valuable as Personal Health Information (PHI) and other health-related data like prescription information, health insurance login information, or Read more about The Relationship Between Healthcare & The Dark Web[…]
It’s no secret that the costs associated with data breaches are trending upward at alarming rates. Just this year, IBM’s annual Cost of a Data Breach Study found that the average cost of a single data breach is approaching $4 million. Although IT repair, identity monitoring services, and regulatory fines quickly make their way to financial statements, Read more about The Unseen Consequences of Data Breaches[…]
Few cyber threats are as prevalent and costly as phishing attacks. In 2018, Microsoft documented a 250% increase in phishing campaigns, which masquerade as legitimate products or services but actually carry malicious payloads that steal credentials and compromise IT integrity. To no surprise, the rise of phishing attacks continues to trend upward and is wreaking havoc for Read more about 4 Phishing Attack Trends of 2019[…]
The remodel is finally complete! We have officially moved into our new building.
We will be moving into our very own building in July. The new building is also located in Kent so we will be calling Kent our home for the foreseeable future. We are excited to move!
Raj and Kamal co-chaired the 2019 South Sound Heart Ball on Friday April 26th. Under Raj and Kamal’s leadership, the campaign raised $400,000 – which is the most amount the campaign has raised. Thank you to all that supported the mission.
2018 was an amazing year for my personal growth and improvements, but I couldn’t have done it without having such a willing and able team helping me along the way. My role with inTech has allowed me to acquire new skills that I did not have and has allowed me to sharpen my existing skills. Read more about Employee of the Year – 2018[…]
Meet Karson! When he isn’t working hard to resolve your I.T. issues, he is enjoying noodles at his favorite noodle place in Seattle Samurai Noodles. When asked what attracts him to this 5th ave restaurant he responds “Try the Noodles!”
Heart disease and stroke take the life of too many of our loved ones, yet most people don’t know that cardiovascular diseases are the number one threat to our health. We are pleased to chair the American Heart Association’s Heart Ball in Tacoma on April 26 to raise awareness of this fact so we can Read more about American Heart Association Heart Ball 2019[…]
We are celebrating our 5 year anniversary this year. It has been an amazing ride. In the 5 years, we have cultivated many relationships, clients on 3 continents and team members in 3 countries. We are excited to see what the next 5 years will look like.
We welcome Roy to our growing team of technology enthusiasts. Roy was born and grew up in the Pacific Northwest. His interests are music and technology. Roy teaches piano to young music enthusiasts in his spare time. Being legally blind does not deter Roy – he uses the built-in operating system accessibility tools along with Read more about New Team Member – Roy[…]
We welcome Jake to our growing team of technology enthusiasts. Jake is originally from the state of New York. His interests are music, hiking and cats.
Brayden was recognized as the Employee of the Year for 2017. We have a committee that recognizes and awards our team members monthly for Employee of the Month and the Employee of the Year is an accumulation of the points earned throughout the year and is awarded in December. Brayden’s specialty is all things Office Read more about Employee of the Year – 2017[…]
Everyone knows that there is a huge fan base for Apple’s iPhone. On September 12th, Apple is scheduled to make some interesting announcements and the main announcement will be the new iPhone 8. We have been monitoring the rumor mill and have come up with the following list of features that are rumored to be Read more about iPhone 8[…]
At one of our manufacturing customers, something strange was happening. Employee lunch was at 11:45am. That became 11:40am over several months. And it was only moving earlier. After tracing out the relay wiring for the alert system, we found the connector to the relay controlling the alert system inside one of the old timeclocks. When Read more about Raspberry Pi Timer[…]
We are remodeling our office to add more space for our new team. We have been growing pretty rapidly – adding 2-3 people per quarter over the last year. We are excited for the remainder of the year as we plan on adding at least 5 more new positions by the end of the year.
We are pleased to announce the expansion of inTech team to Vancouver, Canada. With our new office located at 8333 130th St, Surrey, BC. We are excited for the new positioning this gives inTech as we move into our next year of planning. At inTech Consulting, we believe that to successfully address the customers issues Read more about inTech Canada Location Opening[…]
When your phone dies at 36 percent battery remaining, you replace the battery. When the second battery does the same thing, and re-calibrating the battery doesn’t work, you get a new phone. Or at least that’s what I did. I loved my Samsung Galaxy Note 4 from the time I got it until the time Read more about iSwitched back to the iPhone[…]
So you pay your employees to collect, input, process, correlate, audit and otherwise wrangle the data that drives your business. You’ve paid a small fortune for a line-of-business application to structure and hold all this data and guide your business processes. You’ve invested a great deal of time and energy in implementing all of this Read more about The Myth of Turn-Key Business Intelligence[…]
Secure your hardware Securing your hardware is an often overlooked and simple step you can take to secure your network. The best firewalls and anti-virus systems are rendered useless if burglars steal your equipment, servers, laptops, and mobile phones. Lock your servers and related equipment behind a locked door and secure them with server racks. Read more about 5 Simple Steps You Can Take To Secure Your Small Business Network[…]
We are always on the lookout for new talent, and as manager of our services team I interview a lot of candidates. Some are just starting their career, some are working on a second or third career, and some, like me, have spent years in corporate IT and are looking for a change or a Read more about So You Want To Get Into IT…[…]