top of page
3N1 IT Consultants Security News
Search


A Bite out of Apple? Safari Exploit Discovered
Introduction Do you use Apple services? If you’re like more than 1B people around the world, then you probably do! Whether it’s your...
3N1 IT Consultants
Jan 19, 20243 min read


Who Crossed the Red Cross?
Introduction When you hear about the Red Cross, what first comes to mind? Is it donating blood and plasma? Is it disaster relief and...
3N1 IT Consultants
Nov 3, 20233 min read


The Pros and Cons of MFA
Introduction How often do you use multi-factor authentication on a daily basis? What about weekly? Monthly? How many MFA codes have you...
3N1 IT Consultants
Oct 24, 20233 min read


TypoSquatting: Your Guide to Understanding this Cyber-Threat
Introduction Typos are usually small mistakes you make when you’re writing on your phone or computer. “Fat fingers” are responsible for...
3N1 IT Consultants
Oct 6, 20233 min read


Do You Hire or Fire People? Stay Safe During Turnover
Introduction If you’re reading this now, the title must have intrigued you. Are you involved with the onboarding and offboarding process...
3N1 IT Consultants
Sep 19, 20233 min read


Black Basta Shows No Signs of Slowing Ransomware Attacks
Introduction A ransomware group called Black Basta continues its reign of terror against organizations in the healthcare, manufacturing...
3N1 IT Consultants
Sep 14, 20233 min read


Irish Police Hit By “Industrial Scale” Data Breach
Introduction Law enforcement in Northern Ireland recently woke up to an unfortunate message from their top police officer: More than 10K...
3N1 IT Consultants
Aug 22, 20232 min read


Beware of Spyware: What Is It and How Can You Stay Safe?
Introduction If you’ve ever seen a spy movie, you probably picture “spying” as a complex mission, usually involving bungee cords and...
3N1 IT Consultants
Aug 11, 20232 min read


What is Continuous Monitoring and Why Does it Matter?
Cybercrime doesn’t sleep, so neither can your security defenses. Have you heard of continuous monitoring before? It’s like having a...
3N1 IT Consultants
Aug 4, 20232 min read


Is Cybersecurity Strong Enough…in Space?
Introduction Have you ever wondered whether our space satellites are safe? No…not from alien attacks! Safe from cybercriminal threats....
3N1 IT Consultants
Aug 1, 20233 min read


How to Manage Vendors and Third-Party Risk
Introduction Supply chain risk….vendor management…third party cyberattacks… We have a lot of words for it, but what we’re all talking...
3N1 IT Consultants
Jul 18, 20232 min read


Consumer Financial Protection Bureau’s Big Mistake
Introduction Consumer Financial Protection Bureau, commonly known as CFPB, is a government agency designed to protect consumers’...
3N1 IT Consultants
Jun 20, 20232 min read


A Real Pain: CACTUS Ransomware Wreaks Havoc on VPNs
Introduction Virtual private networks, more commonly known as VPNs, have long been touted as a more secure way to browse the Internet....
3N1 IT Consultants
Jun 2, 20232 min read


Congress Exposed in PHI-Related Data Breach
Introduction How far can cybercriminals go? Can they breach your home network? Could they get through your work computers? What about...
3N1 IT Consultants
May 26, 20233 min read


Beware This New-and-Improved Banking Trojan
There’s a whole new type of malware that has been making the rounds as of late. Whether you’re running the latest version of Windows or...
3N1 IT Consultants
May 16, 20232 min read


Have You Heard of the Near-Ultrasound Inaudible Trojan?
Introduction Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or...
3N1 IT Consultants
May 9, 20232 min read


Imprisoned for Bad Data Privacy?
Introduction Audits happen all the time after a successful cyber-attack. Various agencies, from all levels of government and all over...
3N1 IT Consultants
May 2, 20232 min read


What’s the Fuss About MFA?
Introduction MFA, or Multi-Factor Authentication, uses multiple factors to verify a user’s identity. It is typically used in addition to...
3N1 IT Consultants
Apr 21, 20232 min read


A Dark Power is Rising: Behind the Emerging Ransomware Threat
Introduction A new, sinister ransomware is sweeping the web. Dark Power, the nascent evil of worldwide ransomware threat group, has...
3N1 IT Consultants
Apr 18, 20232 min read


Crash Course in Keylogging: What Is It and What Do You Need to Know?
Introduction What if threat actors could see everything that you did online? Everything you searched, every message you sent, every...
3N1 IT Consultants
Apr 14, 20232 min read

00:44

00:58

00:54

00:54

00:55

00:58
bottom of page


.png)




