top of page
3N1 IT Consultants Security News
Search


Twitter Suffers Data Breach of 400M+ Users
Introduction The CEO of Twitter, Elon Musk, has generated a ton of headlines since he took the helm of Twitter. The social media...
3N1 IT Consultants
Jan 10, 20233 min read


New Year for Cyber-Threats: 3 Things Coming Your Way in 2023
Introduction It’s almost New Year’s! You’ve almost made it through another tumultuous year full of cybersecurity threats and defenses....
3N1 IT Consultants
Jan 3, 20233 min read


PHI: What is It and How to Know Yours is Protected
Introduction We’ve all been to the doctor before. Maybe you make frequent trips for a chronic illness, or do regular checkups every few...
3N1 IT Consultants
Dec 23, 20223 min read


When Credit Card Monitoring is Illegally Monitored
Introduction When your personally identifiable information (PII) is exposed in a data breach, the authorities may ultimately recommend...
3N1 IT Consultants
Dec 20, 20223 min read


Is MFA All It’s Cracked Up to Be?
Introduction Cybersecurity experts have been going on for YEARS about how everyone needs to adopt additional forms of identifying that...
3N1 IT Consultants
Dec 16, 20223 min read


Uber Hacked Again: The Newest Data Breach on the Rideshare App
Introduction Nobody is safe from the recent plague of supply chain attacks…not even one of the largest ride share apps in the world!...
3N1 IT Consultants
Dec 13, 20222 min read


LastPass is Struck Again!
Introduction December blew in with bad news for users of the password manager service, LastPass. Just four months after a data breach...
3N1 IT Consultants
Dec 6, 20223 min read


Happy, Healthy Holidays: 5 Tips for Secure Gift-Giving
Introduction It’s almost the holidays. No matter what you celebrate, this is a special time to spend with loved ones and show each other...
3N1 IT Consultants
Dec 2, 20223 min read


Botnets: Are YOU Part of the Digital Threat?
Introduction Botnets have been around since 2004, when the first one was discovered and branded Bagle. The worm was designed to inundate...
3N1 IT Consultants
Nov 18, 20223 min read


How to Avoid Credit Card Theft
Introduction How often do you use your credit card? How many do you have, and which companies do you rely on? If you’re like the average...
3N1 IT Consultants
Nov 11, 20223 min read


Malvertising: How to Avoid Tempting Scams
Introduction One of the facets of surfing the Web are ads that appear on the sidebar, at the end of videos, as pop-ups in new windows...
3N1 IT Consultants
Nov 8, 20223 min read


3 Tips to Make Your iPhone More Secure
Introduction Apple is one of the top smartphone providers in the world. In the U.S. alone, iPhones rest in the hands of over 113M users....
3N1 IT Consultants
Nov 4, 20223 min read


How to Keep Information Private During Video Calls
Introduction If you’re like the majority of Americans, you probably work from home at least some of the week. These days, you may not...
3N1 IT Consultants
Nov 1, 20224 min read


Avoiding Business Identity Compromise
Introduction You may have heard about Business Email Compromise (BEC) scams before, which are a type of phishing threat meant to trick...
3N1 IT Consultants
Oct 28, 20223 min read


Thief on Thief Crime: Hackers Target the Incarcerated More Than You Think
Introduction They say “don’t do the crime if you can’t do the time,” but what happens when cybercriminals decide to commit their own...
3N1 IT Consultants
Oct 25, 20223 min read


Watch Your Webcam: What Hackers Are Doing With Your Camera
Introduction We’ve all seen it on TV: Cops processing a scene, while to their ignorance a laptop stays open so the perpetrator can watch...
3N1 IT Consultants
Oct 19, 20223 min read


When Cyber-Threats Fly: What the Data Breach on American Airlines Means for You
Introduction American Airlanes experienced a data breach recently…What happened to your data? The cyber event reportedly compromised...
3N1 IT Consultants
Oct 11, 20222 min read


What’s the Most Common Brand Faked By Phishers?
Introduction Phishing scams are rampant in today’s cyber-environment. Over 90% of data breaches start with a well-placed phishing...
3N1 IT Consultants
Oct 7, 20223 min read


The Hidden Threat: What is Man-in-the-Middle?
Introduction How many cyberattacks has your Security Awareness Training taught you to identify? It’s not always about recognizing...
3N1 IT Consultants
Sep 23, 20223 min read


Samsung Announces Data Breach: What Happened to YOUR Info?
Introduction Over Labor Day weekend, Samsung users in the U.S. received an unfortunate email from their provider: “In late July 2022, an...
3N1 IT Consultants
Sep 13, 20223 min read

00:44

00:58

00:54

00:54

00:55

00:58
bottom of page


.png)




