Prevent Users from Accessing Data or Parts of your Network they Don’t Need to with the Principle of Least Privilege.
The principle of least privilege (PoLP) refers to a system in which a user is given the minimum levels of access – or permissions – needed to perform their job function. It determines which users can access a particular file or which devices can access a specific...
Ransomware is a Risk to Everyone-San Francisco 49ers Confirm Cyber Attack
A ransomware gang known for shaming victims and forcing them to pay hefty extortion fees was able to infiltrate the San Francisco 49ers corporate IT network this weekend. The NFL team confirmed the attack earlier this week after the operators of the ransomware listed...
QR Codes the New Way to Get Scammed?
In a world where almost everything has gone contactless, how often are you thinking twice about scanning QR codes? After learning about this discovery, you might be double-checking every time. City officials in Texas reported over 100 incidents of people getting...
Is a Spill-Over Attack Included in your Cyber Security Insurance Policy?
On February 24th, at the beginning of Russia's invasion of Ukraine, a cyber-attack on a satellite internet service provider left thousands of people across Europe without internet. Approximately 13,000 subscribers across Germany, France, Hungary, Greece, Italy,...
Human Error – A Social Engineering Horror Story
Never underestimate the lengths hackers will go to in order to steal from you. Too much confidence in our every day, and seemingly unrelated service providers can leave us open and vulnerable to carefully calculated cyber-attacks. Social engineering – the ability of a...
Beware of Credential Stealing Log-In Methods
In today's digital age, we are always searching for the easiest and fastest way to get things done. The option to use platforms like Facebook, Google, and Twitter to sign up for services allowed for almost instantaneous access without the need to store and remember...
ImpactBT can now show with certainty how new initiatives for IT security will reduce or eliminate risks and demonstrate a clear ROI in new partnership with Axio
SANDY HOOK, CT, JUNE 2, 2021-- Impact Business Technology, a leading Managed IT Service Provider, has today announced its latest strategic partnership with Axio, a leading cyber risk management Software-as-a-Service company. This partnership will utilize the Axio360...
Impact BT Keeps Their Promise of Secure & Effective IT Management with a SOC2 Audit and Certification
SANDY HOOK, CT, April 29, 2021 – Impact Business Technology, a leading Managed IT Service Provider, has today announced its successful completion of the MSPAlliances’ MSP Verify Program (MSPCV) certification and the SOC 2 Type 1 audit. This audit confirms that Impact...
Get cybersecurity news, tips, and best practices delivered straight to your inbox.
For 20+ years Impact Business Technology has delivered custom IT solutions that have a transformative effect on companies.
Our solutions are built on industry-standard platforms with just the right level of customization to achieve your business goals.
