Early Preparation for the 2019 Hurricane

vibrant satellite image of a hurricane showcasing swirling clouds and a clear eye from space.

It is a great idea that everyone has a good plan in place for the upcoming 2019 hurricane to protect their IT systems. We understand the massive damages that hurricanes can do when it gets us unprepared. Below are some steps you can follow in preparation for a hurricane: Property check – Ensure your property […]

Six Steps of a Cyber Security Assessment

surveillance cameras on a gray wall, representing urban security and constant monitoring.

Cyber security risk assessment is an essential element of any information security program.  As the technology landscape continues to evolve, your company needs to take appropriate steps to make sure your data isn’t vulnerable to potential threats.  A great resource for conducting risk assessments is the U.S. Department of Commerce National Institute of Standards and […]

Building a Solid Cyber Security Foundation – 6 Essential IT Security Services

detailed close-up of a blue computer motherboard with colorful slots and heatsinks.

As with any well-built system, effective cyber security begins with building a solid security foundation. Without thoughtful attention to building a good foundation, a business will remain vulnerable to hacks and breaches until they finally decide to face cyber security issues head on. Assessment When first addressing an issue, one must first assess all the […]

The Newest Extortion Scams Are Using Your Own Passwords as Bait

frustrated woman at computer struggling to remember her password, highlighting digital confusion.

Internet scams have become more and more sophisticated. Thus, extortion scammers have found a new piece of bait by which to hook internet users. The bait is their old passwords. These extortion schemes often claim that someone has the person’s compromising information. Then they say are happy to help get that information back if the […]

The Marriott Breach – We Now Know Everything

serene tropical resort pool surrounded by palm trees and vibrant flowers, perfect for relaxation.

Consumers and many employers suffered a significant blow with the massive data breach recently revealed by Marriott International Hotels. Their hacked data included personal information from nearly half a billion guests. Marriott’s reservation system for their Starwood line of hotels exposed personal data including guest names, passport numbers, phone numbers, email and mailing addresses, along […]

Modern logo for 4 Corner IT, featuring a bold blue numeral and circular dots.

Let's Start a Conversation

Fill out the form below and a member of our team will contact you within 10 minutes. (Mon-Fri 8am-6pm EST)

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.