MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY

Does it feel like you’re getting an email update from everyone you’ve ever done business with about how their company is handling COVID-19? A spike in corporate email messages meant to keep customers informed has provided a valuable opening for bad actors to exploit as they mount new phishing attacks.  The United States Secret Service recently released an Read more about MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY[…]

Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]

You’ve Been Breached: Now What?

It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]

How to Spot a Phishing Attempt

Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]

HIPAA 101

Maintaining compliance in today’s ever-changing environment is no easy task, particularly within the healthcare space. In the past, hackers opportunistically targeted providers due to poor security networks and infrastructure. Over time, however, cybercriminals have realized the true value of personally identifiable information (PII) and protected health information (PHI), which can be leveraged for identity theft, financial Read more about HIPAA 101[…]

The NY SHIELD Act is Almost Here: How to Stay Compliant

Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New Read more about The NY SHIELD Act is Almost Here: How to Stay Compliant[…]

How to Stop Credential Stuffing Attacks

A quick glance at recent reports or news headlines paints a dismal picture of the data breach landscape in 2019. Both by the measure of the number of companies compromised and the number of records accessed, breach incidents are occurring at a record-setting pace, with over four billion records exposed for misuse and abuse this year. Read more about How to Stop Credential Stuffing Attacks[…]

The Relationship Between Healthcare & The Dark Web

A data breach is disastrous for any company in any industry, but the healthcare sector is an especially high-stakes arena where data security is of utmost importance and under continual attack. Few types of data are as valuable as Personal Health Information (PHI) and other health-related data like prescription information, health insurance login information, or Read more about The Relationship Between Healthcare & The Dark Web[…]

Data Breach

The Unseen Consequences of Data Breaches

It’s no secret that the costs associated with data breaches are trending upward at alarming rates. Just this year, IBM’s annual Cost of a Data Breach Study found that the average cost of a single data breach is approaching $4 million. Although IT repair, identity monitoring services, and regulatory fines quickly make their way to financial statements, Read more about The Unseen Consequences of Data Breaches[…]

CyberSecurity

4 Phishing Attack Trends of 2019

Few cyber threats are as prevalent and costly as phishing attacks. In 2018, Microsoft documented a 250% increase in phishing campaigns, which masquerade as legitimate products or services but actually carry malicious payloads that steal credentials and compromise IT integrity. To no surprise, the rise of phishing attacks continues to trend upward and is wreaking havoc for Read more about 4 Phishing Attack Trends of 2019[…]

American Heart Association Heart Ball 2019

Heart disease and stroke take the life of too many of our loved ones, yet most people don’t know that cardiovascular diseases are the number one threat to our health. We are pleased to chair the American Heart Association’s Heart Ball in Tacoma on April 26 to raise awareness of this fact so we can Read more about American Heart Association Heart Ball 2019[…]

Raspberry Pi Timer

At one of our manufacturing customers, something strange was happening. Employee lunch was at 11:45am. That became 11:40am over several months. And it was only moving earlier. After tracing out the relay wiring for the alert system, we found the connector to the relay controlling the alert system inside one of the old timeclocks. When Read more about Raspberry Pi Timer[…]

Remodel

We are remodeling our office to add more space for our new team. We have been growing pretty rapidly – adding 2-3 people per quarter over the last year. We are excited for the remainder of the year as we plan on adding at least 5 more new positions by the end of the year.

inTech Canada Location Opening

We are pleased to announce the expansion of inTech team to Vancouver, Canada. With our new office located at 8333 130th St, Surrey, BC. We are excited for the new positioning this gives inTech as we move into our next year of planning. At inTech Consulting, we believe that to successfully address the customers issues Read more about inTech Canada Location Opening[…]

iSwitched back to the iPhone

When your phone dies at 36 percent battery remaining, you replace the battery. When the second battery does the same thing, and re-calibrating the battery doesn’t work, you get a new phone. Or at least that’s what I did. I loved my Samsung Galaxy Note 4 from the time I got it until the time Read more about iSwitched back to the iPhone[…]

The Myth of Turn-Key Business Intelligence

So you pay your employees to collect, input, process, correlate, audit and otherwise wrangle the data that drives your business.  You’ve paid a small fortune for a line-of-business application to structure and hold all this data and guide your business processes.  You’ve invested a great deal of time and energy in implementing all of this Read more about The Myth of Turn-Key Business Intelligence[…]

5 Simple Steps You Can Take To Secure Your Small Business Network

Secure your hardware Securing your hardware is an often overlooked and simple step you can take to secure your network. The best firewalls and anti-virus systems are rendered useless if burglars steal your equipment, servers, laptops, and mobile phones. Lock your servers and related equipment behind a locked door and secure them with server racks. Read more about 5 Simple Steps You Can Take To Secure Your Small Business Network[…]