The FCC just Banned Tech Equipment from Some Foreign Companies Due to a National Security Threat. Here’s How you can Stay Protected.
Last week, the U.S. Federal Communications Commission (FCC) announced the total ban for certain telecom and surveillance equipment from Chinese companies due to an “unacceptable” national security threat. The FCC explained that the companies present on the released...
Newest Cyberattack Trend — SIM Jacking
Summary The devices we use daily offer us convenience and efficiency, but they can also be access points threat actors use to steal personal or private information. For every protection measure we take, cybercriminals are adapting and looking for ways to get around...
Free Microsoft USB Come to you in the Mail? DON’T PLUG IT IN
Security firm Atheniem has uncovered a new scam that uses the incredibly low-tech technique of sending a USB flash drive through the mail hoping that unsuspecting victims will plug it into their device. The package features legitimate-looking Microsoft Office...
Impact Business Technology’s founder & CEO, Neil Holme has become a Registered Practitioner for the CMMC standard.
We are proud to announce that Impact Business Technology's founder & CEO, Neil Holme has become a Registered Practitioner for the CMMC standard. The CMMC program enhances cyber protection standards for companies working with the Department of Defense and soon,...
Do You Like Working From your Mobile Device? Beware of These Common Mobile Security Threats
Mobile initiatives are a top priority for many organizations as research shows that increases in mobility help improve operations and productivity. However, increases in organizational mobility typically result in an increase in the number of mobile devices that are...
Traveling this Summer? Don’t Fall Victim to a Cyberattack While you are Away!
Cybercriminals have started targeting a new demographic in recent years: travelers. When preparing for a trip, cyber security is probably the last thing on your mind. However, not taking cybersecurity into account while traveling puts both vacationers and business...
Prevent Users from Accessing Data or Parts of your Network they Don’t Need to with the Principle of Least Privilege.
The principle of least privilege (PoLP) refers to a system in which a user is given the minimum levels of access – or permissions – needed to perform their job function. It determines which users can access a particular file or which devices can access a specific...
Ransomware is a Risk to Everyone-San Francisco 49ers Confirm Cyber Attack
A ransomware gang known for shaming victims and forcing them to pay hefty extortion fees was able to infiltrate the San Francisco 49ers corporate IT network this weekend. The NFL team confirmed the attack earlier this week after the operators of the ransomware listed...
QR Codes the New Way to Get Scammed?
In a world where almost everything has gone contactless, how often are you thinking twice about scanning QR codes? After learning about this discovery, you might be double-checking every time. City officials in Texas reported over 100 incidents of people getting...
Get cybersecurity news, tips, and best practices delivered straight to your inbox.
For 20+ years Impact Business Technology has delivered custom IT solutions that have a transformative effect on companies.
Our solutions are built on industry-standard platforms with just the right level of customization to achieve your business goals.