70TB of user data stolen from now-defunct social media site Parler.
Does it feel like you’re getting an email update from everyone you’ve ever done business with about how their company is handling COVID-19? A spike in corporate email messages meant to keep customers informed has provided a valuable opening for bad actors to exploit as they mount new phishing attacks. The United States Secret Service recently released an Read more about MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY[…]
As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]
Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]
Maintaining compliance in today’s ever-changing environment is no easy task, particularly within the healthcare space. In the past, hackers opportunistically targeted providers due to poor security networks and infrastructure. Over time, however, cybercriminals have realized the true value of personally identifiable information (PII) and protected health information (PHI), which can be leveraged for identity theft, financial Read more about HIPAA 101[…]
In the previous blog post, we talked about our first speaking gig of 2018, on Cybersecurity. We talked about the importance of being very aware of the dangers of Viruses, Malwares, and Security Breaches. Here is the link to this post. With that said, 95% of breaches are caused by human error and 55% of Read more about Top 5 Simple Tips: on Preventing Viruses, Malwares, and Security Breaches[…]
As we get closer to 2020, we start entering the deep waters of immersive technology that can be very exciting but also worrisome. It is nice to have online banking, buy clothes from an online website, store our private photos on the cloud (instead of a physical drive that could be destroyed in a fire), and Read more about First Speaking Gig of the Year – A Talk on Cybersecurity[…]
At one of our manufacturing customers, something strange was happening. Employee lunch was at 11:45am. That became 11:40am over several months. And it was only moving earlier. After tracing out the relay wiring for the alert system, we found the connector to the relay controlling the alert system inside one of the old timeclocks. When Read more about Raspberry Pi Timer[…]
We are remodeling our office to add more space for our new team. We have been growing pretty rapidly – adding 2-3 people per quarter over the last year. We are excited for the remainder of the year as we plan on adding at least 5 more new positions by the end of the year.
We are pleased to announce the expansion of inTech team to Vancouver, Canada. With our new office located at 8333 130th St, Surrey, BC. We are excited for the new positioning this gives inTech as we move into our next year of planning. At inTech Consulting, we believe that to successfully address the customers issues Read more about inTech Canada Location Opening[…]
My days are hectic. My life is run by my calendar and therefore my iPhone. I am constantly checking emails, making calls and researching topics and products from my phone all day. If you know me then you know how much I love my iPhone 7. The problem has always been the battery life! I Read more about Apple iPhone 7 Smart Battery Case Is The Best![…]
Come see us at our booth at the Kent Business Expo today at the ShoWare Center. Looking forward to meeting some great people.
I get really excited at the beginning of September – every year. I am a huge Apple fan, iPhone fan, more specifically. Apple will announce the new iPhone model and we will be watching the live event tomorrow and will post what we learn afterwards. Here is what the rumors say: The design of the Read more about What is Apple announcing tomorrow?[…]
We are at the VMworld conference this year learning about all of the new technologies that are being introduced by the biggest names in the industry. We will post what we learned on Friday.
We constantly come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm. Here’s an overview of the most commonly used terms Read more about Know your terminology[…]
So you pay your employees to collect, input, process, correlate, audit and otherwise wrangle the data that drives your business. You’ve paid a small fortune for a line-of-business application to structure and hold all this data and guide your business processes. You’ve invested a great deal of time and energy in implementing all of this Read more about The Myth of Turn-Key Business Intelligence[…]