One recurring topic that continues to come up is the idea of outsourcing your IT, and when is the appropriate time to start taking a serious look at that model. Whether it’s because of budgetary constraints or a laundry list of other reasons, sometimes it’s in your best interest to find a strategic partner that…
Archives for 2020
The Dangers of the Inbox
Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re curious about the subject line or because you assume the sender is trustworthy. Unfortunately, this is how most cyberattacks tend to begin – with a single click. What unfolds next…
COVID-19 Workplace Case Recording: Technical Considerations
As our clients begin the process to safely reopen their facilities to workers, we have received numerous questions focused on the collection, transmittal, and storage of information related to employee medical information related to COVID-19. The following guidance was prepared to assist anyone that may need a starting point as they determine their organization’s course…
Protecting yourself from vendor fraud
What is vendor fraud? Vendor fraud occurs when a fraudster poses as a person or entity you know and trust (a vendor, an executive, etc.) and requests a change to banking information. If the fraudster can convince you to change payment information and you make the payment, any payments sent will go to the fraudster…
Common-Sense Tips to Reduce Your Cyber Risks
At Infonaligy, we deal with many companies who approach us for assistance with improving their organizational cybersecurity. Cybersecurity is a complex topic with lots of moving parts. Very few organizations have an IT environment that could be classified as ‘simple’, and what works in one environment may not work in another. Starting with a solid…
CMMC April Update
Beginning in 2020, any contractor or subcontractor doing business with the Department of Defense will be required to undergo a third-party audit of their cybersecurity maturity under the framework of the Cybersecurity Maturity Model Certification (CMMC). Although some important details and requirements are still being defined, here’s what you need to know to start preparing…