• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

ITS HomepageITS

Trusted IT Solutions

  • Home
  • About
    • Employment
    • History
    • Our Team
  • Blog
  • Support
    • Customer Support Portal
    • Remote Support Tool
    • Links and KB
  • Contact Us
  • Business Solutions
  • Data Center Solutions
  • Education Solutions
  • Physical Security
  • Helpdesk Request
  • Remote Support Tool

itsadmin

New Ransomware Scam

The FBI periodically releases warnings and bulletins regarding popular scams that impact businesses and consumers. Their March 6 brief highlighted a scam rooted in cyberspace, but attacking victims through the postal service. Victims in this scheme are generally corporative executives. They receive a letter at their physical address warning them that their business has been […]

Cookie Choices

Understanding Cookies: What You Need to Know Have you ever visited a website and been greeted with a pop-up asking you to accept cookies? You’re not alone. But what exactly are cookies, and why should you care about how you handle them? What Are Cookies? Cookies are small text files that websites store on your […]

KnowBe4 Security Tip of the Month: Become a Human Firewall

Many security breaches are caused by a weak human firewall. A human firewall is the layer of protection that you create by following security protocols. If you build a strong human firewall, you can help protect your organization from cybercriminals. To build a strong human firewall, follow the tips below: Create Strong Passwords Carefully Analyze […]

AI Office Pranks

One of our teammates recently took a well-deserved vacation—and found themselves on the receiving end of an AI-powered office prank. Leading up to their time off, the team had been discussing an office pizza party. So, naturally, we “planned” one while they were away. With just two quick photos of the office kitchen and a […]

Why The PowerSchool Breach Matters for Non-School Entities Too

If you don’t have students in a school using PowerSchool, you should still think about the method of attack and how it can be replicated on technology services you use. In this case, a set of third-party credentials were used to access a support portal. There was no multi-factor authentication (MFA) enforced on this support portal, and the support tunnel was wide-open. Two commonly used security measures have now been implemented: MFA is required to use the support portal, and the support tunnel is opened by request only.

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 32
  • Go to Next Page »

Primary Sidebar

The Latest Posts:

  • OneDrive Sync with Personal Accounts

    OneDrive Sync with Personal Accounts

    May 19, 2025
  • ITS Completes Annual SOC Audit

    ITS Completes Annual SOC Audit

    May 8, 2025
  • Cookie Choices

    Cookie Choices

    March 3, 2025
  • AI Office Pranks

    AI Office Pranks

    February 4, 2025
  • Windows 10 End-of-Support

    Windows 10 End-of-Support

    September 20, 2024
  • Personal Security Conversations

    Personal Security Conversations

    September 12, 2024
  • Facebook Recovery Codes

    Facebook Recovery Codes

    December 20, 2023

Footer

Contact Us:

319-465-4463

22068 Business Highway 151
Monticello IA 52310

info [at] iowadatacenters.com

Submit a helpdesk ticket to:

helpdesk [at] iowadatacenters.com

Follow Us!

  • Facebook
  • LinkedIn

Remote Support Tool

Helpdesk Request

Copyright © 2025