top of page
3N1 IT Consultants Security News
Search


Beginning of the End? Behind the Latest Breach on ChatGPT
Introduction Since bursting onto the scene in November 2022, ChatGPT has changed the game for artificial intelligence bots. Gone are the...
3N1 IT Consultants
Jun 9, 20233 min read


Beware This New-and-Improved Banking Trojan
There’s a whole new type of malware that has been making the rounds as of late. Whether you’re running the latest version of Windows or...
3N1 IT Consultants
May 16, 20232 min read


Have You Heard of the Near-Ultrasound Inaudible Trojan?
Introduction Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or...
3N1 IT Consultants
May 9, 20232 min read


Is Your Network Security Decentralized?
Introduction Decentralized cybersecurity. Centralized defense structures. What do these terms mean? They refer to different ways you...
3N1 IT Consultants
Apr 28, 20232 min read


Is Your Face ID Being Held Without Your Consent…or Your Knowledge?
Introduction Face ID is just one form of biometric identification that is used in a variety of ways. Sometimes it’s for convenience and...
3N1 IT Consultants
Apr 11, 20233 min read


What Does “The Internet Is Forever” Really Mean?
Introduction You’ve probably heard this advice before… “The Internet is forever!” Did you take the advice, or roll your eyes? Hopefully...
3N1 IT Consultants
Apr 7, 20232 min read


Cyber-Criminals Are Going After Crypto ATMs
Introduction Do you use cryptocurrency? If you do, then how do you refill your wallet – have you ever visited a crypto ATM to purchase...
3N1 IT Consultants
Mar 31, 20233 min read


Don’t Bother the Bees: Honeypots and How to Avoid Them
Introduction You may have heard the term “honeypot” from your managed service provider before, but what does the term really mean? In...
3N1 IT Consultants
Mar 24, 20232 min read


Data Breach on AT&T Rattles Millions
Introduction Do you use AT&T as your primary telecom provider? Do you know someone who does? Then you need to know what’s just happened...
3N1 IT Consultants
Mar 17, 20233 min read


Guide to ChatGPT: What It Is, What It Can Do and Where It’s Going
Introduction You’ve probably heard of ChatGPT. It’s a fancy new artificial intelligence machine that’s been making headlines for writing...
3N1 IT Consultants
Mar 10, 20233 min read


Breach on GoDaddy Goes Back “Multiple Years”
Introduction Whether you’ve used it before or just seen it in commercials, you’ve probably heard about GoDaddy.com before. The website...
3N1 IT Consultants
Feb 21, 20233 min read


How to Manage Third-Party Risks
Introduction Third-party risk management is a very serious and ever-more pressing need than ever before. Our monumental reliance on...
3N1 IT Consultants
Feb 14, 20232 min read


Roaming Mantis: Real-Time Case Study in Compromised Public WiFi
Introduction The longer you go without being negatively impacted by a data breach, it’s natural to become more blasé with some of the...
3N1 IT Consultants
Feb 10, 20232 min read


How Encryption Really Works: A Beginner’s Guide
Introduction Encryption is one of the most commonly misunderstood subjects when it comes to protecting sensitive data. Even those with a...
3N1 IT Consultants
Jan 31, 20233 min read


Spam? Don’t Just Click “Delete”
Introduction No matter what email platform you use, who you connect with, and where you choose to give out your email address, we all...
3N1 IT Consultants
Jan 16, 20232 min read


New Year for Cyber-Threats: 3 Things Coming Your Way in 2023
Introduction It’s almost New Year’s! You’ve almost made it through another tumultuous year full of cybersecurity threats and defenses....
3N1 IT Consultants
Jan 3, 20233 min read


Secure Access Service Edge: Coming in 2023?
Introduction There are plenty of cybersecurity attacks and defenses coming your way in 2023. Ransomware will continue to dominate the...
3N1 IT Consultants
Dec 30, 20223 min read


PHI: What is It and How to Know Yours is Protected
Introduction We’ve all been to the doctor before. Maybe you make frequent trips for a chronic illness, or do regular checkups every few...
3N1 IT Consultants
Dec 23, 20223 min read


When Credit Card Monitoring is Illegally Monitored
Introduction When your personally identifiable information (PII) is exposed in a data breach, the authorities may ultimately recommend...
3N1 IT Consultants
Dec 20, 20223 min read


Is MFA All It’s Cracked Up to Be?
Introduction Cybersecurity experts have been going on for YEARS about how everyone needs to adopt additional forms of identifying that...
3N1 IT Consultants
Dec 16, 20223 min read

00:57

00:59

00:59

00:54

00:53

01:00
bottom of page


.png)