4it Helps Miami-Dade College Secure National Science Foundation Grant to Prepare a Cybersecurity Workforce in South Florida

MIAMI – November 16, 2018 –  With the help of early adopters like 4it, one of South Florida’s leading strategic IT consulting companies, Miami-Dade College was awarded a National Science Foundation grant to prepare cybersecurity workforce in South Florida by developing and implementing an Associate in Science in Cybersecurity. The two-year Associate is aimed to … Read more4it Helps Miami-Dade College Secure National Science Foundation Grant to Prepare a Cybersecurity Workforce in South Florida

OneDrive Off A Cliff

In my last blog, I posted about the value of implementing two-factor authentication (2FA) as a significant enhancement to the security of the traditional username/password authentication method.  The availability of free authentication applications like Google Authenticator, Authy, and FreeOTP (there are many more), and the ever growing list of public websites that now support these … Read moreOneDrive Off A Cliff

Security Training Awareness: Create A Plan and Track Effectiveness

email security on laptop

As robust as your organization’s security program, policies, and toolsets are, there is still one vulnerability that even the most secure IT department cannot control – your employees. Cybercriminals rely on the fact that many employees are inadequately trained and underestimate the risks of phishing scams and ransomware.  With over 53,000 security incidents and more … Read moreSecurity Training Awareness: Create A Plan and Track Effectiveness

Welcome to the New Normal

ransomware skull and files

Welcome to the new normal, as we usher in another massive worldwide fear inspiring ransomware attack.  I will spare you the technical details of this specific malware, but I do feel it is important to understand the common elements of this latest attack, and the ongoing preferred methodology being used in ransomware attacks. In April of this … Read moreWelcome to the New Normal

4 Ways Hackers Can Disrupt Your Life

hacker in hoodie

If a hacker manages to get their grubby hands on your computer, you’re going to have a bad time. Of course, how bad of a time you have depends on your hacker’s intentions. There are several things hackers can do to harm you, here are four of the most common ways hackers can disrupt your … Read more4 Ways Hackers Can Disrupt Your Life

We use cookies to gather information about the way you interact with our website, to create reports, and overall help us in improving the website. To learn more about our cookie policy, view our Privacy Policy. By clicking “Accept & Close”, you consent to the use of cookies unless you have disabled them.