IT Expert Blog

The Shocking Facts About The New FTC Safeguards Rule That Affect Nearly EVERY Small Business Operating Today

By IP Services | - Jul. 18, 2023

As former President Ronald Regan once said, the scariest words you’ll ever hear are “We’re from the government, and we’re here to help.” In this case, the government is trying to help by forcing nearly all businesses to implement and maintain a strong cyber security program to protect the customer information these companies host –…

Is It Illegal To Track Your Employees’ Activities When They’re Working From Home?

By IP Services | - Jul. 11, 2023

Along with the surge of people working from home or in hybrid situations over the last few years, there has also been an increase in employers looking for ways to monitor their employees’ work activities to ensure they actually ARE working when remote. This is no surprise given the new “quiet quitting” trend that has…

Zero Trust Computing

By Scott Alldridge | - May. 27, 2022

What is Zero Trust Security Practices? -Zero Trust was first coined by Forrester Research analyst John Kindervag in 2010 as the trust model at the time was broken and the only solution was to remove the idea of trusted internal networks and untrusted external networks.  Instead, Forrester presented the idea that all network traffic must…

Shmishing

SMiShing – Is it just me or have you been experiencing an increase in SMS (text) spams?

By Toni Overton | - Apr. 01, 2022

Smishing is a portmanteau of “SMS” (short message services, better known as texting) and “phishing.” When cybercriminals “phish,” they send fraudulent emails that seek to trick the recipient into opening a malware-laden attachment or clicking on a malicious link. Smishing simply uses text messages instead of email.  (usa.Kaspersky.com) Between 2021 and 2022 spam texts have…

A Beginner’s Guide to Cybersecurity

By IP Services | - Feb. 23, 2022

Written by Guest Contributor: Carla Lopez The internet makes life easier in many ways. From online shopping to remote learning and working from home, all kinds of tasks are simplified when you can get online. However, the internet also opens people up to new threats. IP Services provides cybersecurity services and resources to help individuals…

Infosecurity and Cybersecurity Differences

By Toni Overton | - Feb. 15, 2022

Is there a difference between Information Security Management and Cybersecurity Management? Short answer, YES.  If your role is in information security, your main concern would be in protecting your company’s data from unauthorized access – of any kind.  Electronic and physical (think file cabinets, trash containers, shred-it boxes, desk drawers, etc.)  If your role is…

Apache Vulnerability

By Toni Overton | - Jan. 18, 2022

As I am sure most of you are aware Apache released information in December concerning a vulnerability in their Log4j module.  Apache’s Log4j (log for java) software library affects versions 2.0-beta9 to 2.14.1, known as “Log4Shell.” Resolution of the issue requires patching to the current version, 2.17.1 (Java 8), 2.12.4 (Java 7) or 2.3.2 (Java…

8 Cybersecurity Tips for the Holidays

By Toni Overton | - Dec. 08, 2021

It is a wonderful and joyful time of the year, but unfortunately, it’s also a busy time for cybercriminals to take advantage of you.  The National Retail Federation (and IP Services!) would remind you of these simple precautions: Keep a clean machine – make sure whatever device you use for online shopping has the latest…

Ransomware picture

Ransomware Threat to the Banking Industry

By Toni Overton | - Nov. 23, 2021

According to a recent article in the Institutional Asset Manager Newsletter, the financial sector was one of the most targeted by cybercriminals in 2020 during the Covid-19 pandemic at a time when rapid shifts in working practices left organizations vulnerable. In the first emergency phase of the pandemic in Q2 2020, ransomware attacks on financial organizations…

FREE REPORT

Cybersecurity Protection Strategies, Engaging VisibleOps

In a world where cybersecurity threats are increasingly complex, organizations must adopt robust practices to secure their IT operations.

“The VisibleOps Handbook” series produced by IP Services, in partnership with the IT Process Institute, provides a framework to address these challenges, focusing on creating transparent and auditable IT processes.

Learn more about these risks in IP Service's Free Report: "Cyber Attack Primer".

Get the Report