top of page
3N1 IT Consultants Security News
Search


MGM Shut Down By a Phone Call
Introduction Have you heard about the attack on MGM Resorts International? On September 11, 2023 the major casino and hotel operator was...
3N1 IT Consultants
Sep 26, 20232 min read


Are Cookies Taking a Bite Out of Your Data Privacy?
Introduction Have you heard of cookies before? No, not the kind made with chocolate chips or oatmeal raisins… We’re talking about...
3N1 IT Consultants
Sep 22, 20232 min read


Do You Hire or Fire People? Stay Safe During Turnover
Introduction If you’re reading this now, the title must have intrigued you. Are you involved with the onboarding and offboarding process...
3N1 IT Consultants
Sep 19, 20233 min read


Black Basta Shows No Signs of Slowing Ransomware Attacks
Introduction A ransomware group called Black Basta continues its reign of terror against organizations in the healthcare, manufacturing...
3N1 IT Consultants
Sep 14, 20233 min read


Safe or Suspicious? X Now Requires Photo Verification
Introduction X, formerly known as Twitter, has been undergoing some big changes lately. A recent announcement will make big changes to X...
3N1 IT Consultants
Sep 12, 20232 min read


Your Guide to the US Cyber Trust Mark
Introduction The United States Federal Communications Commission, more commonly known as the FCC, is trying to patent what they call the...
3N1 IT Consultants
Sep 8, 20232 min read


Application Whitelist Vs. Blacklist
Introduction There are all kinds of applications that you can, and might already have, installed on whatever device you’re reading this...
3N1 IT Consultants
Sep 5, 20232 min read


Geofencing: What Is It, and How Does It Factor into Data Privacy and Cybersecurity?
Introduction The World Wide Web allows us to connect to people all over the globe, but you can still put limits around real geographical...
3N1 IT Consultants
Aug 29, 20233 min read


Irish Police Hit By “Industrial Scale” Data Breach
Introduction Law enforcement in Northern Ireland recently woke up to an unfortunate message from their top police officer: More than 10K...
3N1 IT Consultants
Aug 22, 20232 min read


Let’s Cast a Light on Shadow IT
Introduction Be honest: Have you ever used your cellphone at work when you weren’t supposed to? Brought in your personal laptop to use...
3N1 IT Consultants
Aug 18, 20232 min read


Mobile Device Management
Introduction Do you work remotely some or all of the time? Have you ever checked your work email while on vacation with your tablet?...
3N1 IT Consultants
Aug 15, 20232 min read


Beware of Spyware: What Is It and How Can You Stay Safe?
Introduction If you’ve ever seen a spy movie, you probably picture “spying” as a complex mission, usually involving bungee cords and...
3N1 IT Consultants
Aug 11, 20232 min read


What is Continuous Monitoring and Why Does it Matter?
Cybercrime doesn’t sleep, so neither can your security defenses. Have you heard of continuous monitoring before? It’s like having a...
3N1 IT Consultants
Aug 4, 20232 min read


Is Cybersecurity Strong Enough…in Space?
Introduction Have you ever wondered whether our space satellites are safe? No…not from alien attacks! Safe from cybercriminal threats....
3N1 IT Consultants
Aug 1, 20233 min read


Over 100K ChatGPT Accounts Compromised
Introduction Have you ever used ChatGPT? What about any similar artificial intelligence? AI has gotten extremely popular, but it’s not...
3N1 IT Consultants
Jul 25, 20232 min read


How to Manage Vendors and Third-Party Risk
Introduction Supply chain risk….vendor management…third party cyberattacks… We have a lot of words for it, but what we’re all talking...
3N1 IT Consultants
Jul 18, 20232 min read


How Does Gen Z Stack Up Against Cybersecurity Best Practices?
Introduction There are more than 2B of them around the world. They’ll make up nearly a third of the workforce by 2030. Most of them have...
3N1 IT Consultants
Jul 14, 20233 min read


What is Data Localization…and Is it in Our Future?
Introduction Is your private data being stored in offshore accounts somewhere? How would you even know? If you live somewhere with data...
3N1 IT Consultants
Jul 11, 20233 min read


Data Poisoning: Why AI Isn’t Infallible
Introduction Despite its robust reputation, AI is not the be-all, end-all of human invention. Most artificiaI intelligence software will...
3N1 IT Consultants
Jul 7, 20233 min read


Tricks to Avoid Phishing Scams for Mobile Users
Introduction Have you taken Security Awareness Training or even passed simulated phishing campaigns at work? Hopefully, you’re a little...
3N1 IT Consultants
Jul 4, 20233 min read

00:44

00:58

00:54

00:54

00:55

00:58
bottom of page


.png)




