top of page
3N1 IT Consultants Security News
Search


Behind the Hospital Curtain: Why Is PHI Such a Hot Topic?
Introduction Managed Care of North America, commonly known simply as MCNA Dental, suffered a major healthcare data breach when its...
3N1 IT Consultants
Dec 8, 20233 min read


Why Hackers Love the Holidays
Introduction The winter holidays are here. Snow is in the air, and so is that magical feeling. The comfort and warmth of blazing...
3N1 IT Consultants
Dec 5, 20233 min read


Is Google Wiretapping Your Calls?
Introduction In October 2023, a class-action lawsuit was filed against Google alleging that the company’s “human-like” customer service...
3N1 IT Consultants
Dec 1, 20232 min read


Scattered Spider Skitters Back Onto Scene
Introduction No…not the kind with eight legs and eyes! Image by RÜŞTÜ BOZKUŞ from Pixabay Scattered Spider is a threat group that has...
3N1 IT Consultants
Nov 28, 20233 min read


What the End of the Writer Strike Means for AI
Introduction If you follow any TV or movies at all, then you probably have heard about the writer’s strike that was going on in...
3N1 IT Consultants
Nov 24, 20232 min read


Injecting More than Just Vaccines: Prompt Injection Attacks Run Rampant
Introduction How much do you rely on artificial intelligence? While threats and vulnerabilities aren’t new to AI machines, they’re...
3N1 IT Consultants
Nov 21, 20233 min read


Money Goes Even More Digital
Introduction What is the digital Euro? This is a question on a lot of Europeans’ minds these days, as the conglomerate of international...
3N1 IT Consultants
Nov 17, 20232 min read


Battle of the Sexes: Who Does Cyber-Safety Better?
Introduction Are men and women significantly different when it comes to cyber-safety? The answer is both yes and no ! All else being...
3N1 IT Consultants
Nov 14, 20232 min read


Are You Part of A Culture of Cybersecurity?
Introduction Cybersecurity and cyber-compliance go hand in hand, and they’re much more than just buzzwords that you may have heard at work! Keeping your most private data secure is not only important to your job; it’s mandated by law in many industries and important to the people whose personally identifiable information you manage and maintain. Does your workplace encourage cybersecurity and compliance? By making this a part of company culture, the organization can become
3N1 IT Consultants
Nov 7, 20233 min read


Who Crossed the Red Cross?
Introduction When you hear about the Red Cross, what first comes to mind? Is it donating blood and plasma? Is it disaster relief and...
3N1 IT Consultants
Nov 3, 20233 min read


Falling for Common Internet Scams?
Introduction The internet is a vast and ever-changing landscape, and with that comes both good and bad. One of the downsides of the...
3N1 IT Consultants
Oct 31, 20233 min read


Behind the Average Ransomware Attack
Introduction If you’ve been following this blog for awhile, then you’ve probably heard about the dangers of ransomware a lot. Hopefully,...
3N1 IT Consultants
Oct 27, 20232 min read


The Pros and Cons of MFA
Introduction How often do you use multi-factor authentication on a daily basis? What about weekly? Monthly? How many MFA codes have you...
3N1 IT Consultants
Oct 24, 20233 min read


Why the Dark Web Loves PHI
Introduction Private health information, better known as PHI, refers to all of that confidential patient data stored within health...
3N1 IT Consultants
Oct 20, 20232 min read


The Battle for Your Children’s Data
Introduction Do you have kids? If you do, you’re probably at least a little worried what they’re doing online when you’re not around....
3N1 IT Consultants
Oct 17, 20233 min read


When Biometrics Get Stolen
Introduction Samsung just got strapped with a $4M arbitration fee to over 35K customers involved in a class action lawsuit against the...
3N1 IT Consultants
Oct 13, 20233 min read


What Is Software as a Service?
Introduction How do you get new software onto your systems? There are two ways you might get new applications delivered to your system:...
3N1 IT Consultants
Oct 10, 20233 min read


TypoSquatting: Your Guide to Understanding this Cyber-Threat
Introduction Typos are usually small mistakes you make when you’re writing on your phone or computer. “Fat fingers” are responsible for...
3N1 IT Consultants
Oct 6, 20233 min read


Hacking for Good? It’s Possible, Lucrative and Legal
Introduction Hacking isn’t always a malicious attempt to prey on your systems and data. Sometimes it can be used for good! No,...
3N1 IT Consultants
Oct 3, 20232 min read


When Bobcats Go Ballistic
Introduction If you were hoping for a peaceful autumn devoid of cyberattacks, then sit down for some bad news: An Iranian hacker group...
3N1 IT Consultants
Sep 29, 20232 min read

00:44

00:58

00:54

00:54

00:55

00:58
bottom of page


.png)




