Blog
  • Register

ITS, Inc. Blog

ITS, Inc. has been serving the California area since 1998, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Make IT Security a Priority for Your Business

Make IT Security a Priority for Your Business

With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.

0 Comments
Continue reading

Video Conferencing Security is Important

Video Conferencing Security is Important

Video conferencing has been one of the surprise winners of the COVID-19 era. As large percentages of people are asked to distance from others, one solution that has been extremely popular is to have meetings over the Internet. While seemingly the whole world is using video conferencing solutions, for the business, there are other considerations that have to be made. Today, we’ll hit on some strategies you can use to improve the security of your web conferences. 

0 Comments
Continue reading

Tip of the Week: Sanitize Your Computer

Tip of the Week: Sanitize Your Computer

While we may talk about computer viruses a lot, we wanted to change tack briefly and talk about the other kind--the kind that makes you sick, rather than your technology. With COVID-19 still plaguing the news, we felt that there was no time like the present to do so.

0 Comments
Continue reading

Scammers are Using Economic Impact Payments to Phish People

Scammers are Using Economic Impact Payments to Phish People

It may not be a surprise to you that hackers and other scammers are trying to get between you and your stimulus money. Using the COVID-19 pandemic to prey on unsuspecting or ill-prepared people, they have already made off with more than millions of the $290 billion that the U.S. government has earmarked for its citizens. Let’s look at how you can avoid being another unfortunate victim of the modern cybercriminal. 

0 Comments
Continue reading

Is Security in Telework a Myth?

Is Security in Telework a Myth?

With so many people working from home due to the COVID-19 outbreak, organizational IT security is stretched thin. It is important that you know how to maintain operational integrity while prioritizing security when your whole staff is working from home. 

0 Comments
Continue reading

How to Ensure Your Cloud Platforms are Secure

How to Ensure Your Cloud Platforms are Secure

Before we start on what practices you should be prioritizing when it comes to your cloud resources, we want to recognize that most businesses have found cloud computing to be extraordinarily useful. In fact, that is why we wanted to discuss some actions that you need to implement to help keep your cloud-based resources secure. 

0 Comments
Continue reading

Tip of the Week: Activating Two-Step Verification on a Microsoft Account

Tip of the Week: Activating Two-Step Verification on a Microsoft Account

Two-step authentication/verification has seen considerable popularity as a means of securing an account. To help you boost the protections surrounding your Microsoft account, we’re offering a few tips on how to use two-step verification, as Microsoft refers to it.

0 Comments
Continue reading

Tip of the Week: Improve Your Mobile Data Management

Tip of the Week: Improve Your Mobile Data Management

Data accessibility has never been easier for both you and your workforce, but how do you know if this convenience isn’t also benefitting cybercriminals? Your mobile device contains a vast amount of sensitive information and files which need to be kept secure. This presents the need for some sort of secure management system, which in the tech world is referred to as Mobile Information Management, or MIM.

0 Comments
Continue reading

Updating the Latest Major Data Breaches

Updating the Latest Major Data Breaches

A lot has been made recently about cybersecurity, and for many people it has caused them to alter the way they go about doing things. With more people more cognizant of their individual data privacy, and how to combat phishing and other social engineering attempts, you’d think major data breaches would be snuffed out regularly. It only takes one person, however, to fail to be vigilant for it to negatively affect a whole organization.

0 Comments
Continue reading

Tip of the Week: How to Use PowerPoint as a Training Tool

Tip of the Week: How to Use PowerPoint as a Training Tool

Training your employees is important. One tool that you may find useful is Microsoft PowerPoint, as it allows you to create an engaging and informative training program.

0 Comments
Continue reading

The Small Business Cybersecurity Starter Pack

The Small Business Cybersecurity Starter Pack

Running a business is one thing, but it is quite another to protect it from issues and threats. There is a vast assortment of potential obstacles that can pop up during your operations. Likewise, there are many ways that a business needs to be protected, each one as crucial as the last. A few basics include:

0 Comments
Continue reading

Tip of the Week: Methods to Securing Your Smartphone

Tip of the Week: Methods to Securing Your Smartphone

The smartphone has quickly become a staple in modern society, as users rely on them to accomplish more and more. You could probably say the same of your own use of it. This means that there are not only huge amounts of smartphones and smartphone users, there is a huge amount of threats out there to target them.

0 Comments
Continue reading

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

0 Comments
Continue reading

If You Aren’t Patching Your Systems, Any Breaches are On You

If You Aren’t Patching Your Systems, Any Breaches are On You

Everyone in a business has set responsibilities that they need to fulfill, one major one being proper security maintenance. A failure to uphold this responsibility could have serious consequences, including the very real potential of a security breach. It could be argued, in fact, that if you aren’t patching your systems, you’re inviting cybercriminals in.

0 Comments
Continue reading

The Cloud Isn’t Necessarily Safe

The Cloud Isn’t Necessarily Safe

The Cloud. That big, vague entity where a lot of us our entrusting our information has lifted a huge burden off of businesses by alleviating the need for expensive onsite hardware. It makes user management a little more user friendly. It keeps us connected and in communication no matter where we are.

0 Comments
Continue reading

How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.

0 Comments
Continue reading

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on from SQL Server 2008 or SQL Server R2 have going forward.

0 Comments
Continue reading

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Looking Back at 2019 Data Breaches

Looking Back at 2019 Data Breaches

Data is more of a commodity than it has ever been, and more often than not, companies spend a considerable sum on data security. Unfortunately, even the most well-defended organizations still have trouble keeping data safe. 2018 saw 446.5 million records exposed due to data breaches, even though the overall number of breaches dropped by 23 percent to 1,244 total. We’ll discuss some of the most notable breaches that have happened over the first four months of 2019.

0 Comments
Continue reading

Latest News & Events

ITS, Inc. is proud to announce the launch of our new website at https://www.its-co.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what ITS, Inc. can do for your business.

Call Us Today
Call us today
(209) 952-5955

4092 Metro Dr. Suite 100
Stockton, California 95215

RSS feed facebook 001 Twitter 001 Linkedin 001