FAQ

Get answers to the most common business IT questions with these FAQs. Need more help? Just book a meeting for a no-pressure consultation with one of our IT experts.

What Is a Vulnerability vs an Exploit?

What Is a Vulnerability vs an Exploit?

December 8, 2022

A vulnerability is a weak spot in a system. Vulnerabilities enable hackers and crackers to gain access to a network.  It is virtually impossible to have no weak spots, and not all weak spots exist inside the code itself. The biggest vulnerability for many companies is people.  Human examples of vulnerabilities include a human response…

Read More
What Is a Zero Day Attack?

What Is a Zero Day Attack?

December 8, 2022

A zero day attack happens when a hacker takes advantage of an unpatched or previously unknown vulnerability for the first time (also known as a zero day vulnerability).  Some examples of zero day exploits include: Critical system vulnerabilities and exposures are tracked by some organizations and websites to distribute to others. They maintain lists of…

Read More
What Are the Benefits of IT Service Management?

What Are the Benefits of IT Service Management?

December 8, 2022

There are multiple benefits associated with IT service management, including: Aside from the benefits above, the day-to-day conveniences of using an ITSM are many. ITSM is not just support via a help desk or a service desk. While an ITSM may support your business via a service desk, the offerings are much broader than that.…

Read More
What Is IT Service Management?

What Is IT Service Management?

December 8, 2022

An IT service management (ITSM) company uses a process to create, deliver, plan, support, implement and operate your IT technology to best serve you and your clients or customers. Their services encompass all technology services and devices: laptops and the applications on them, servers, printers, all software applications, even your passwords. Here’s a list of…

Read More
What is the CIS Checklist - CIS Controls

What Is the CIS Checklist?

September 1, 2022

The Center for Internet Security (CIS) is a nonprofit devoted to helping people, businesses and governments protect themselves from cyber threats. It is globally recognized for developing the best practices for securing IT systems and data. The CIS distills advice into a recommended set of actions. These are called the CIS Critical Security Controls. Internos…

Read More
What are Dark Web Monitoring Services - FAQ

What are Dark Web Monitoring Services?

September 1, 2022

Dark Web Monitoring Services are regularly scans the Dark Web for credentials belonging to you, your employees or your business. Internos offers Dark Web monitoring as well as a free preliminary scan so that businesses can see how the service works and the value it provides. At Internos, we use a combination of human and…

Read More
What is a Dark Web Scan - FAQ

What is a Dark Web Scan?

September 1, 2022

A Dark Web Scan is pretty much exactly what it sounds like, a scan of Dark Web sites for any credentials identified as belonging to your business. The idea is to find credentials that have been compromised so that they can be replaced. Also, it’s important to know what information is out there about your…

Read More
multi-factor authentication set up - FAQ

How do I roll out a multi-factor authentication set up for my business?

May 11, 2022

You know MFA is the right move for your business. But how do you smoothly roll out a multi factor authentication set up for your team? As with any change, there will be some resistance. Here is an action plan to help you push past people’s fear to get up and running. Start with the…

Read More
multi factor authentication vs 2 factor authentication - FAQ

What is multi factor authentication vs 2 factor authentication?

May 11, 2022

Multi factor authentication (MFA) and two factor authentication (2FA) are often used interchangeably, but they are technically different. Both prove you are who you say you are when you are logging into a system. But 2fa specifically requires two forms of authentication. MFA requires two or more. So all 2FA is MFA but not all…

Read More
find top managed IT services providers - FAQ

How do I find top managed IT services providers?

May 11, 2022

Managed IT service providers come in all shapes and sizes, from the “guy in his garage” to large national firms. So, finding one won’t be a problem. But you can’t just choose any managed service provider. It’s important to find a quality IT partner for your business Here is what to look for: 24/7/365 monitoring…

Read More