What is Advanced Threat Protection (ATP) for Email?

Patrick Leonard

Advanced Threat Protection (ATP) can mean a lot of things, but when describing an email feature, it is a tool created to stop email threats from hitting your inbox. Since the majority of ransomware and other viruses enter a company’s network via malicious email attachments and links, it is imperative that companies do what they can to minimize their risk of a cyber-attack. (Note – ATP is called ATD by some companies, which stands for Advanced Threat Detection. For the most part, the difference in wording is semantics, but some companies use the two terms to denote email protection versus firewall protection.)

Read More
Topics: Data Protection

How A/E/C Firms Use 3D Printing

Guest Author

One of the latest construction technologies that has moved from bleeding-edge technology to a viable, cost-efficient business solution in the construction industry is 3D printing. However, there are still many misnomers and uncertainty on how A/E/C firms can utilize this powerful technology resource, so we asked an industry expert, Trey Richoux with Entrescan, to help us explain 3D printing and its impact on the construction industry. 

Read More
Topics: Automotive, Architecture/Engineering/Construction

What is Two-Factor Authentication (2FA)?

Patrick Leonard

Two-Factor Authentication is an extra layer of security that requires more than just the user’s name and password. To gain access, the user must present something via a different method such as a token, fingerprint, web cookie, or code from a text message or authentication application like Google Authenticator. Two-Factor Authentication is known as 2FA for short, or even Two-Step Verification (TFA). For comparison, Single-Factor Authentication (SFA) only requires your username and password, and it is still the most common form of access because of its low cost and ease of use, but a hacker can breach most password-based security systems easily.

Read More
Topics: Data Protection

3 Biggest Construction Cybersecurity Risks

Michael Erdman

The construction industry is driving technology and innovation on the jobsite to become more efficient, profitable, and to combat the ongoing worker shortage. Today, construction equipment is equipped with on-board computers, sensors, GPS, and more. Crews must work with dozens of companies from the design phase with architects, engineers, and sub-consultants, to the build phase which includes numerous subcontractors, requiring them to share sensitive data in real-time. Yet, with all this technology and data, there is no universal industry best practice for cybersecurity in construction, like how healthcare has HIPAA compliancy. So how do you minimize the cybersecurity risks at your construction company without effecting productivity?

Read More
Topics: Architecture/Engineering/Construction

3 Biggest Cybersecurity Mistakes Medical Practices Make

Stephen Tullos

Healthcare is no longer just about curing ailing patients. Medicine requires securing your patient’s Protected Health Information (PHI).

Even though HIPAA has been around since 1996, last year the industry averaged a breach a day, affecting 27,314,647 patient records. (Protenus) Even with millions of dollars paid in fines (in February, a Miami, Florida non-profit paid $5.5 million to settle a HIPAA case and a Dallas-area hospital paid a $3.2 million HIPAA penalty according to MSPmentor report), most medical practices don’t know what to do when it comes to securing their PHI and we regularly see these 3 cybersecurity mistakes at medical practices.  

Read More
Topics: Heathcare IT

The ROI of Standardization

David Bourgeois

As we onboard new clients, we educate them on the power of standardizing their hardware and the financial benefits of doing so. By standardization, I don’t mean every user at My IT has the same computer or every person in your company needs the same devices, but you should be able to create groups of users that have similar needs. For example, an engineer needs a more powerful computer than someone in administration because the engineer runs CAD programs that take up a lot of memory and storage. Also, a mechanic or someone working in the field needs a durable laptop while that engineer will prefer the speed of a desktop model. Creating a few basic user groups or profiles allows you to standardize your hardware while still giving each employee the right tool for the job.

Read More
Topics: High Growth, Efficiency & Productivity

Top 3 Auto Dealership Cybersecurity Mistakes

Patrick Leonard

Although most auto dealerships have robust security systems and processes in place to protect their inventory of cars and parts (and money), many auto dealerships are inept in their cybersecurity. Generally, the absence of cybersecurity is from a lack of knowledge of the threat and ramifications of a cyber-attack. Many General Managers feel their dealerships are too small to be targeted by a hacker or they think if they ignore it long enough, the problem will never arise.

Read More
Topics: Automotive

6 Critical Steps SMBs Need to Protect Themselves from Ransomware

Stephen Tullos

Cybersecurity is all over the news thanks to WannaCry’s high-profile attack on NHS (National Health Service) and more than 200,000 systems in over 150 countries. Yet, many companies were unaffected because they fortified themselves against such cyber-attacks. How does a small to mid-sized company prevent a cyber-attack such as one with the reach of WannaCry?

Read More
Topics: Data Protection

Cybersecurity Myths Executives Cling To

Dave Bourgeois & Patrick Leonard

One of the biggest obstacles in cybersecurity is company executives who think they do not need to worry about cyber-attacks. The range of excuses why cybersecurity isn’t on executives’ radars are wide and we’ll debunk them in a bit.

Keep in mind, if you don’t do anything to prevent or mitigate a cyber-attack, it will probably be too late to do anything once it starts. Whether you’re a Fortune 500 enterprise or a small three-person company, 94% of all companies do not survive more than two years following a major data loss regardless if it is a cyber-attack, theft, or disaster. [Gartner]

Prevention is the best way to protect your company’s future and it is a lot cheaper too.

Read More
Topics: Data Protection

Construction Tech – Smart Tools

Perryn Olson

Last month we discussed how tech savvy construction jobsites have become over the past few years. Besides having a robust remote office in a temporary jobsite trailer that houses high speed internet, smartboards, and digital blueprints, the tools on the jobsite have become “smart” too. By smart, I mean connected to the network and offer the user detailed information about the job at hand. Yes, we’re way past tools just having digital displays and laser beams. Now those laser beams can automatically measure distances for pinpoint accuracy and in less time than doing the task manually. The era of construction smart tools has already begun.

Read More
Topics: Architecture/Engineering/Construction

About My IT's Blog

We believe an educated client is the best client, therefore, we share our knowledge with executives and business owners looking for a fair, knowledgeable IT firm that fits well with their company and objectives.

My IT helps companies to protect their data, become more efficient and productive, and to boost high-growth using technology. In our blog, we discuss these topics and our extensive expertise working with medical practices, construction industry companies, and auto dealerships.

New Call-to-action

Share This Page

    

Subscribe to Email Updates

Real Time Web Analytics