top of page
3N1 IT Consultants Security News
Search


Authentication Recovery
Introduction Multi-factor authentication, or MFA, makes you prove your identity in addition to entering a strong password, before...
3N1 IT Consultants
Mar 21, 20232 min read


Data Breach on AT&T Rattles Millions
Introduction Do you use AT&T as your primary telecom provider? Do you know someone who does? Then you need to know what’s just happened...
3N1 IT Consultants
Mar 17, 20233 min read


Guide to ChatGPT: What It Is, What It Can Do and Where It’s Going
Introduction You’ve probably heard of ChatGPT. It’s a fancy new artificial intelligence machine that’s been making headlines for writing...
3N1 IT Consultants
Mar 10, 20233 min read


Gamer or Gambler? Watch Out for this New Social Engineering Threat
Introduction Ice Breaker . No, not the kind that you play during team building exercises. This is the name of a recent social...
3N1 IT Consultants
Mar 7, 20233 min read


What to Do with Default Apps
Introduction If you downloaded iTunes anytime in the early 2000s, you might remember being confused when it came preloaded with the U2...
3N1 IT Consultants
Feb 28, 20232 min read


Breach on GoDaddy Goes Back “Multiple Years”
Introduction Whether you’ve used it before or just seen it in commercials, you’ve probably heard about GoDaddy.com before. The website...
3N1 IT Consultants
Feb 21, 20233 min read


Data Breach Exposes 1M CHS Patients’ PHI
Introduction Are you one of the people across America who rely on Community Health Systems? CHS is a leading operator of general acute...
3N1 IT Consultants
Feb 17, 20232 min read


How to Manage Third-Party Risks
Introduction Third-party risk management is a very serious and ever-more pressing need than ever before. Our monumental reliance on...
3N1 IT Consultants
Feb 14, 20232 min read


Roaming Mantis: Real-Time Case Study in Compromised Public WiFi
Introduction The longer you go without being negatively impacted by a data breach, it’s natural to become more blasé with some of the...
3N1 IT Consultants
Feb 10, 20232 min read


Inside the Breach on T-Mobile
Introduction 37M T-Mobile customers learned that their personally identifiable information (PII) was exposed in a data breach on the...
3N1 IT Consultants
Feb 3, 20233 min read


How Encryption Really Works: A Beginner’s Guide
Introduction Encryption is one of the most commonly misunderstood subjects when it comes to protecting sensitive data. Even those with a...
3N1 IT Consultants
Jan 31, 20233 min read


What You Need to Know About Physically Securing Your Devices
Introduction A lot of cybersecurity awareness revolves around the digital security of all your devices…but how well do you take care of...
3N1 IT Consultants
Jan 27, 20232 min read


What is PKI and Why Does it Matter?
Introduction Do you know what a network security key is? Simply put, it’s the password that you need to input before your local network...
3N1 IT Consultants
Jan 24, 20233 min read


Spam? Don’t Just Click “Delete”
Introduction No matter what email platform you use, who you connect with, and where you choose to give out your email address, we all...
3N1 IT Consultants
Jan 16, 20232 min read


Is Malware About to Get 60x Faster?
Introduction Artificial intelligence has become incredibly powerful. We can create animated avatars of ourselves with just a facial...
3N1 IT Consultants
Jan 13, 20232 min read


Why Does Incident Reporting Matter?
Introduction If your confidential data was exposed in a breach, wouldn’t you want to know immediately? Most people would! So here’s a...
3N1 IT Consultants
Jan 10, 20233 min read


Twitter Suffers Data Breach of 400M+ Users
Introduction The CEO of Twitter, Elon Musk, has generated a ton of headlines since he took the helm of Twitter. The social media...
3N1 IT Consultants
Jan 10, 20233 min read


Crypto Exchange Hacks: What Is It and How to Protect Yourself
Introduction Whatever your opinion is on cryptocurrency – whether you think it’s going to be the only kind of money around someday, or...
3N1 IT Consultants
Jan 6, 20232 min read


New Year for Cyber-Threats: 3 Things Coming Your Way in 2023
Introduction It’s almost New Year’s! You’ve almost made it through another tumultuous year full of cybersecurity threats and defenses....
3N1 IT Consultants
Jan 3, 20233 min read


PHI: What is It and How to Know Yours is Protected
Introduction We’ve all been to the doctor before. Maybe you make frequent trips for a chronic illness, or do regular checkups every few...
3N1 IT Consultants
Dec 23, 20223 min read

00:57

00:59

00:59

00:54

00:53

01:00
bottom of page


.png)