top of page
3N1 IT Consultants Security News
Search


RaaS: What Are These Kits
Imagine a threat actor determined to target YOUR data and finances. It would take a LOT of time, effort and money to build ransomware...
3N1 IT Consultants
Mar 19, 20242 min read


Is Your Smart Phone Spying on You?
Introduction How often has a friend, coworker or family member introduced you to something for the first time…only for it to show up on...
3N1 IT Consultants
Mar 12, 20242 min read


Back Up: Is Your Digital Life Protected?
Introduction Data loss can happen to anyone, at any time. It can be caused by a hardware failure, software corruption, malware attack,...
3N1 IT Consultants
Feb 6, 20243 min read


Are You a CISO? The Law Could Be After You!
Introduction Are you the Chief Information Security Officer at your organization? CISOs are a very important part of an organization’s...
3N1 IT Consultants
Feb 2, 20243 min read


How One Wobbly Domino Brought Down an Organization
Introduction Have you heard about Okta? Even if you haven’t, you still might have been affected by the large-scale breach on their...
3N1 IT Consultants
Jan 30, 20243 min read


DDOS Attack Compromises ChatGPT
Introduction Have you hopped full-force onto the bandwagon of artificial intelligence? AI is smart; it has advanced far beyond the...
3N1 IT Consultants
Jan 26, 20243 min read


A Bite out of Apple? Safari Exploit Discovered
Introduction Do you use Apple services? If you’re like more than 1B people around the world, then you probably do! Whether it’s your...
3N1 IT Consultants
Jan 19, 20243 min read


What the End of the Writer Strike Means for AI
Introduction If you follow any TV or movies at all, then you probably have heard about the writer’s strike that was going on in...
3N1 IT Consultants
Nov 24, 20232 min read


Injecting More than Just Vaccines: Prompt Injection Attacks Run Rampant
Introduction How much do you rely on artificial intelligence? While threats and vulnerabilities aren’t new to AI machines, they’re...
3N1 IT Consultants
Nov 21, 20233 min read


Battle of the Sexes: Who Does Cyber-Safety Better?
Introduction Are men and women significantly different when it comes to cyber-safety? The answer is both yes and no ! All else being...
3N1 IT Consultants
Nov 14, 20232 min read


Are You Part of A Culture of Cybersecurity?
Introduction Cybersecurity and cyber-compliance go hand in hand, and they’re much more than just buzzwords that you may have heard at work! Keeping your most private data secure is not only important to your job; it’s mandated by law in many industries and important to the people whose personally identifiable information you manage and maintain. Does your workplace encourage cybersecurity and compliance? By making this a part of company culture, the organization can become
3N1 IT Consultants
Nov 7, 20233 min read


Who Crossed the Red Cross?
Introduction When you hear about the Red Cross, what first comes to mind? Is it donating blood and plasma? Is it disaster relief and...
3N1 IT Consultants
Nov 3, 20233 min read


The Pros and Cons of MFA
Introduction How often do you use multi-factor authentication on a daily basis? What about weekly? Monthly? How many MFA codes have you...
3N1 IT Consultants
Oct 24, 20233 min read


TypoSquatting: Your Guide to Understanding this Cyber-Threat
Introduction Typos are usually small mistakes you make when you’re writing on your phone or computer. “Fat fingers” are responsible for...
3N1 IT Consultants
Oct 6, 20233 min read


Do You Hire or Fire People? Stay Safe During Turnover
Introduction If you’re reading this now, the title must have intrigued you. Are you involved with the onboarding and offboarding process...
3N1 IT Consultants
Sep 19, 20233 min read


Black Basta Shows No Signs of Slowing Ransomware Attacks
Introduction A ransomware group called Black Basta continues its reign of terror against organizations in the healthcare, manufacturing...
3N1 IT Consultants
Sep 14, 20233 min read


Application Whitelist Vs. Blacklist
Introduction There are all kinds of applications that you can, and might already have, installed on whatever device you’re reading this on! If it’s a laptop or desktop computer, you might have programs like Microsoft Office, Spotify, Slack, and even games like Minecraft or The Sims. Meanwhile, your phone may have apps installed, such as Apple Music or iMessage. Unfortunately, not all applications are functional—or even safe. Legacy applications that are discontinued likely h
3N1 IT Consultants
Sep 5, 20232 min read


Irish Police Hit By “Industrial Scale” Data Breach
Introduction Law enforcement in Northern Ireland recently woke up to an unfortunate message from their top police officer: More than 10K...
3N1 IT Consultants
Aug 22, 20232 min read


Mobile Device Management
Introduction Do you work remotely some or all of the time? Have you ever checked your work email while on vacation with your tablet?...
3N1 IT Consultants
Aug 15, 20232 min read


Beware of Spyware: What Is It and How Can You Stay Safe?
Introduction If you’ve ever seen a spy movie, you probably picture “spying” as a complex mission, usually involving bungee cords and...
3N1 IT Consultants
Aug 11, 20232 min read

00:57

00:59

00:59

00:54

00:53

01:00
bottom of page


.png)




