Blog

Blog

When the People You Trust Phish You

Display name spoofing is getting very specific. Today, we take a look at the prevalent problem and talk about ways you can mitigate your organization’s exposure to it.

Read More

Paying a Ransom Demand Could Get Even More Expensive

The United States Treasury Department says that ransomware payments may violate economic sanctions. Let’s dig into the issue.

Read More

Three Seldom Considered Elements of a Backup Strategy

Simply having a backup device doesn’t guarantee that your business will be ready for a data-loss event.

Read More

Mobility is Crucial

Is your business mobile-ready? Like it or not, your employees have mobile devices—it’s your job to make sure your infrastructure can securely handle them.

Read More

Reviewing Zoom’s Efforts to Improve Its Security

Responding to the increase in threats after its meteoric rise in popularity, Zoom has made some significant security upgrades. Learn more about them today.

Read More

JTT's Weekly IT Tips

Join JTT's Director of Client Services, Nic Cofield, as he covers Microsoft Office News, IT Security Risk Assessment, Vendor Management and DNS & Web Security

Read More