Computer hacker holding open a laptop that reads you've been hacked on its screen
| |

What An IT Risk Assessment Can Save You

Thanks to the horrible stories you see on the news about cyberattacks, customers are worried about IT risks like ransomware, foreign nation-state hackers, cryptocurrency scams, and phishing.  Unfortunately, they are blissfully unaware of the major risks that they are taking every day. These risks include the lack of reliable backups, misconfigured security when it comes…

computer code on a screen
|

Data Breaches : How They Happen, and How To Prevent Them

Data breaches are a nasty and unfortunately common part of the IT world. In this blog, Connetic Founder and CEO Matthew Strebe talks about why data breaches happen, and what organizations can do to prevent them. Data breaches are a vicious cycle: past data breaches are contributing directly to the execution of new data breaches….

phishing hacker wearing dark hooded sweatshirt at desktop computer
| |

Everything You Need to Know About Phishing

Phishing scams are the number one cyber attack, directed at millions of small businesses every day. Scammers send forged email messages to employees trying to get them to click on attachments or links; these attachments or links then give the hacker full access to login information. Typically, the link will be to a website that…

How do Cyber Attackers Use Your Personal Information?
| | |

How do Cyber Attackers Use Your Personal Information?

Most people believe that their personal information isn’t worth that much. After all, contact information is often handed out on business cards all the time, right? Wrong! How do cyber attackers use your personal information? In the hands of hackers, personal information is very valuable. As the saying goes, knowledge is power, and in this…

ransomware attack
| | | |

Ransomware: What Led to the Colonial Pipeline Attack?

On May 7, an employee of Colonial Pipeline found a ransomware attack note from hackers on a control-room computer. By that evening, Colonial paid DarkSide $4.4 million in Bitcoin for a key to unlock its files. “I will admit that I wasn’t comfortable seeing money go out the door to people like this,” CEO Joseph Blount…

Credential Handling It services
| | |

IT Consulting Advice: Improve Employee Credential Handling

What’s the number 1 rule of Credential Handling? Say it with us: Don’t re-use the same password across multiple web services!  Unfortunately, employees frequently break this rule of  IT Consulting, across both personal and professional IT support practices. This, combined with the fact that often employees use their work email as their web service usernames,…

Work From Home Cybersecurity Tips
| |

Work From Home Cybersecurity Tips

With many of us still working from home, it’s easy to get into bad cybersecurity habits that could put your company’s data at risk. As seasoned IT consultants, we’ve used these work from home cybersecurity tips to mitigate risk during the pandemic and beyond! Share these tips with your employees to ensure each person is…

cybersecurity
| |

Cybersecurity 101: Get the Protection You Need

Typical IT support companies aren’t always great at providing the services you need to give your company protection due to their break/fix business model: something breaks, they fix it, and then they charge you. We, on the other hand, believe in empowering our clients through sharing our expertise and providing unlimited services (at no extra…

5 IT Risks That You’re Exposing Your Business To
| |

5 IT Risks That You’re Exposing Your Business To

In the 22 years that Connetic has been performing cybersecurity audits, we have built a very mature cybersecurity audit and incident-handling practice. Our capability in finding every security vulnerability that affects a company provides transparency into what our customers need to fix in their environments. This dramatically reduces the risk of costly losses associated with…