2207, 2022

What the End of Internet Explorer Means for You

By |July 22, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , , , |Comments Off on What the End of Internet Explorer Means for You

As we all began our first forays onto the internet, it's more than likely that you did so through Internet Explorer. Marked with an iconic letter "E" and a yellow orbit, the web browser, for much of the history of the internet, was the dominant browser used by individuals and [...]

807, 2022

Verizon Report: Ransomware Continues to Rise

By |July 8, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , , , |Comments Off on Verizon Report: Ransomware Continues to Rise

You were right if it felt like ransomware attacks were all over the headlines over the past year. According to the 2022 Verizon Data Breach Investigations Report, ransomware attacks were up more than the last five years combined last year and marked an “unprecedented year in cybersecurity history.” According to [...]

2406, 2022

BlackCat Ransomware: Here’s What to Know

By |June 24, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , , , |Comments Off on BlackCat Ransomware: Here’s What to Know

Ransomware remains a massive cybersecurity challenge for organizations everywhere, with costs expected to rise from $20 billion in 2021 to $265 billion by 2031, according to estimates by Cybersecurity Ventures. This is a significant increase that's affecting nearly every organization worldwide, from the smallest SMB to the largest global enterprise. [...]

1006, 2022

The Latest Facebook Phishing Attack: Here’s What to Know

By |June 10, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on The Latest Facebook Phishing Attack: Here’s What to Know

As cyberattacks continue to rise, phishing remains one of the most prevalent ways for attackers to break past small and medium business (SMB) defenses and compromise an organization. According to the Verizon Data Breach Report for 2021, phishing remained the top vector of attack for organizations, present in 36 percent [...]

2005, 2022

Report: More than $6.9B Lost to Cyber Crimes in 2021

By |May 20, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on Report: More than $6.9B Lost to Cyber Crimes in 2021

If you felt like the headlines in 2021 were dominated by cyberattacks and cybercrime, you were right. The data is in, and 2021 was a record year for cybercrime on every front, with $6.9 billion lost to internet crimes during the year, according to the FBI’s 2021 Internet Crime Report [...]

605, 2022

QR Codes: The Risks, Benefits, and Real-World Applications

By |May 6, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on QR Codes: The Risks, Benefits, and Real-World Applications

Over the past two years, we have seen a fast rise in the usage of QR codes to help customers quickly access web pages on the go. This has opened the door for new ways for SMBs to market and share important information and new potential risks for customers. According [...]

2004, 2022

What is a Cybersecurity Maturity Model?

By |April 20, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on What is a Cybersecurity Maturity Model?

Cyberattacks have increased exponentially over the past few months, hitting businesses of all sizes and industries. Damages globally are estimated to have reached $6 trillion in 2021 and are on track to rise to $10.5 trillion by 2025 — a staggering sum. Small and medium businesses (SMBs) have proven particularly [...]

804, 2022

Why Companies Are Moving to a Zero Trust Model of Cyber Security

By |April 8, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on Why Companies Are Moving to a Zero Trust Model of Cyber Security

When it comes to cyber security, one of the biggest buzzwords circulating the market is "Zero Trust." Zero Trust is a principle that starts from an assumption that nothing can be trusted — be it users or devices — and blocks them from network access until they can prove themselves [...]

2503, 2022

Plan Your Windows Server 2012 and 2012 R2 End of Support Today

By |March 25, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on Plan Your Windows Server 2012 and 2012 R2 End of Support Today

As the saying goes, all good things must come to an end. This is true even for systems we use to run business-critical and mission-critical workloads, such as Windows Server 2012 and 2012 R2. Microsoft recently announced that it would stop support for older versions of Windows Server, including Windows [...]

1103, 2022

Report: Nearly Every Enterprise Hit by Successful Cyber Incident

By |March 11, 2022|Categories: Agilitec IT Blog, IT Blog|Tags: , , , , , , , , , , , , , , |Comments Off on Report: Nearly Every Enterprise Hit by Successful Cyber Incident

You only have to turn on the TV or open a newspaper to see that cyberattacks have been on the rise over the last number of years. However, according to a recent report, the impact may be bigger than we even think. According to the Anomaly Cybersecurity Insights Report, which [...]

Go to Top