Cyber Security

You want to focus on what your organization does best, not lose sleep over cyber crime. You’ve worked too hard to lose money or your livelihood to cyber crime. Take this burden off your shoulders by learning the best cyber security practices to protect your company, employees and customers.

file sharing image

File Sharing Dangers and Best Practices

December 23, 2021

Everyone shares files whether it’s a photo, an email or a message to someone we know. But the way those files are shared can literally give hackers the key to all your other data. It’s very easy these days to inadvertently share a file in a way that opens up a back door to all…

Read More
tech gift ideas image

Tech Gift Ideas for the 2021 Office Giving Season

December 2, 2021

“You better watch out!” Santa is on the way, which means so is Secret Santa  and employee gift season. It can be challenging to find interesting gifts that are workplace appropriate. So we put together a few ideas, from our office to yours. It includes our tried and true cyber security tech gifts as well…

Read More
Next Generation Antivirus image

Next Generation Antivirus (EDR): Why Endpoint Protection (EPP) Alone Is Not Enough

November 11, 2021

If you are using standard antivirus (endpoint protection or EPP), you are falling behind in the race — the one against the cyber criminals trying to access your network and steal your data or disrupt your business. EPP is simply not enough to get the job done. You need next generation antivirus: endpoint detection and…

Read More
managing cyber security image

Managing Cyber Security Is NOT a Tech Issue (It’s a Business Issue)

October 28, 2021

You read that correctly. Cyber security is not a tech issue because it affects more than just the tech part of your business.  It impacts every area of your business. It shouldn’t be put on the back burner or dealt with separately from any other business issue. It needs to be central to planning. Too…

Read More
Multi Factor Authentication image

Need Cyber Insurance? Better Have Multi Factor Authentication (MFA)

October 14, 2021

The single most impactful changes you can make to improve your cyber security is to adopt multi factor authentication (MFA). If you haven’t made the change for your business yet, here’s another compelling reason: Some cyber security insurance companies require it. There’s a good reason why insurance companies like Travelers are now requiring that companies…

Read More
The Social Engineering Attack Cycle

The Social Engineering Attack Cycle: How Hackers Gain Your Trust in 4 Steps

October 7, 2021

Criminals get the information they use to breach your company in what is called the social engineering attack cycle. But you don’t have to be an expert on the social engineering framework to protect your business. A good managed service provider will train your team on how to prevent phishing attacks and other cyber security…

Read More
cloud security image

Cloud Security Is NOT “Built In” to Cloud Services

September 23, 2021

Whether you’ve made the move to the cloud for your business or just considering it, there is one thing you need to know: Not all cloud services have built-in cloud security or cloud backups. Some do, some don’t. For your cloud safety, you not only need to make sure your cloud data is backed up,…

Read More
Law Firm IT Support image

Law Firm IT Support: Are You Leveraging These Top Technology Tools?

September 16, 2021

Now more than ever before, law firms need to raise the bar on their IT technology.  Here is a list of technology tools you should consider leveraging for your law practice. At the top of that list is cloud computing and security. Talk to your law firm IT support provider about the right tools for…

Read More
define vulnerability image

What Is the Difference? Define Exploit, Vulnerability, Hacking and Cracking

September 9, 2021

As an MSP, Internos helps clients understand cyber security threats and protect their business. With words used interchangeably, it can be hard to pin down what they really mean. So this post will define exploit, vulnerability, hacking, cracking and other cyber security terms. Hacking vs Cracking Hacking is what you think it is: an intrusion…

Read More
Password Management image

No KIS Password Management Guide for the Office (and Beyond)

August 26, 2021

As a managed services provider for Miami area businesses, we provide cyber security services. That includes training teams on the best password management policies and tools. Here are some tips to help your business. The KIS philosophy reminds us to “keep it simple.” (We dropped the rude second S). KIS works in many areas of…

Read More