ITS is proud to announce the successful completion of our annual SOC audit – with an expanded scope that now includes our managed services processes and procedures under the SOC 2 framework. Our previous audits only covered our data center and related processes and services. This year, we added our managed services practice to the […]
Featured
New Ransomware Scam
The FBI periodically releases warnings and bulletins regarding popular scams that impact businesses and consumers. Their March 6 brief highlighted a scam rooted in cyberspace, but attacking victims through the postal service. Victims in this scheme are generally corporative executives. They receive a letter at their physical address warning them that their business has been […]
Cookie Choices
Understanding Cookies: What You Need to Know Have you ever visited a website and been greeted with a pop-up asking you to accept cookies? You’re not alone. But what exactly are cookies, and why should you care about how you handle them? What Are Cookies? Cookies are small text files that websites store on your […]
AI Office Pranks
One of our teammates recently took a well-deserved vacation—and found themselves on the receiving end of an AI-powered office prank. Leading up to their time off, the team had been discussing an office pizza party. So, naturally, we “planned” one while they were away. With just two quick photos of the office kitchen and a […]
Why The PowerSchool Breach Matters for Non-School Entities Too
If you don’t have students in a school using PowerSchool, you should still think about the method of attack and how it can be replicated on technology services you use. In this case, a set of third-party credentials were used to access a support portal. There was no multi-factor authentication (MFA) enforced on this support portal, and the support tunnel was wide-open. Two commonly used security measures have now been implemented: MFA is required to use the support portal, and the support tunnel is opened by request only.