FAQ

Get answers to the most common business IT questions with these FAQs. Need more help? Just book a meeting for a no-pressure consultation with one of our IT experts.

What is the CIS Checklist - CIS Controls

What Is the CIS Checklist?

September 1, 2022

The Center for Internet Security (CIS) is a nonprofit devoted to helping people, businesses and governments protect themselves from cyber threats. It is globally recognized for developing the best practices for securing IT systems and data. The CIS distills advice into a recommended set of actions. These are called the CIS Critical Security Controls. Internos…

Read More
What are Dark Web Monitoring Services - FAQ

What are Dark Web Monitoring Services?

September 1, 2022

Dark Web Monitoring Services are regularly scans the Dark Web for credentials belonging to you, your employees or your business. Internos offers Dark Web monitoring as well as a free preliminary scan so that businesses can see how the service works and the value it provides. At Internos, we use a combination of human and…

Read More
What is a Dark Web Scan - FAQ

What is a Dark Web Scan?

September 1, 2022

A Dark Web Scan is pretty much exactly what it sounds like, a scan of Dark Web sites for any credentials identified as belonging to your business. The idea is to find credentials that have been compromised so that they can be replaced. Also, it’s important to know what information is out there about your…

Read More
multi-factor authentication set up - FAQ

How do I roll out a multi-factor authentication set up for my business?

May 11, 2022

You know MFA is the right move for your business. But how do you smoothly roll out a multi factor authentication set up for your team? As with any change, there will be some resistance. Here is an action plan to help you push past people’s fear to get up and running. Start with the…

Read More
multi factor authentication vs 2 factor authentication - FAQ

What is multi factor authentication vs 2 factor authentication?

May 11, 2022

Multi factor authentication (MFA) and two factor authentication (2FA) are often used interchangeably, but they are technically different. Both prove you are who you say you are when you are logging into a system. But 2fa specifically requires two forms of authentication. MFA requires two or more. So all 2FA is MFA but not all…

Read More
find top managed IT services providers - FAQ

How do I find top managed IT services providers?

May 11, 2022

Managed IT service providers come in all shapes and sizes, from the “guy in his garage” to large national firms. So, finding one won’t be a problem. But you can’t just choose any managed service provider. It’s important to find a quality IT partner for your business Here is what to look for: 24/7/365 monitoring…

Read More
cyber security assessment services - FAQ

Do I need cyber security assessment services?

May 11, 2022

Cyber security assessment services are performed to find and fix cyber security risks. There are many types of assessments. Which  you need for your business depends on your type of business, your industry, the size of your company and your risk tolerance. But every business should complete cyber risk assessments or some type. The most…

Read More
co-managed IT services - hybrid IT services - FAQ

What are co-managed IT services (also called hybrid IT services)?

May 11, 2022

Co-managed IT services (or hybrid IT services) are when you use a managed service provider (MSP), to supplement your in-house IT staff.  Larger businesses that can maintain an internal IT team often find that co-managed services are the best of both worlds: You decide what tasks to keep in-house and how to best leverage the…

Read More
cloud computing benefits for small business - FAQ

Are there cloud computing benefits for small business?

May 11, 2022

Cloud computing benefits for small business include: Flexibility. Cloud computing expands your technological infrastructure resources as needed. No need to plan ahead and figure out how much data storage will you need in a year or how many locations will need to access that data. Simply scale your cloud services to meet your needs. Lower…

Read More
cyber security managed service provider - FAQ

What is a cyber security managed service provider?

May 11, 2022

A cyber security managed service provider (also called a managed cyber security provider or MSSP) provides cyber security services as part of end-to-end IT coverage. Those services typically  include: Proactive monitoring 24/7/365 that is looking for vulnerabilities and fixing them before they can be exploited. Infrastructure management, recommending specific security and productivity improvements. Help desk…

Read More