• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

ITS HomepageITS

Trusted IT Solutions

  • Home
  • About
    • Employment
    • History
    • Our Team
  • Blog
  • Support
    • Customer Support Portal
    • Remote Support Tool
    • Links and KB
  • Contact Us
  • Business Solutions
  • Data Center Solutions
  • Education Solutions
  • Physical Security
  • Helpdesk Request
  • Remote Support Tool

Featured

SMS Scam to Voice Phishing

A few weeks ago, Brian Krebs of Krebs on Security reported on a scam that a reader had come across where an innocent-looking text message led to a voice phishing call. SMS phishing or “smishing” is a type of phishing attack that comes to the target in the form of a text message. Usually these […]

E-Waste: How to properly recycle your tech

Do you have a special spot at home that collects unused and unwanted tech stuff simply due to the fact that you’re unsure of how to get rid of it? Electronic waste (or e-waste) often carries heavy metals like mercury, lead, lithium, and other hazardous materials that can contaminate our ecosystem and pollute the air […]

“Your screen is being observed”

What does it mean? If you use a Mac, you may have seen this message before. If it is the first time you’re seeing it, it may be alarming if your mind automatically assumes that there is a lurker somewhere on the web “observing” the things you’re doing on your computer. Luckily, there’s no need […]

Watch For These Phishing Keywords

Invoice Examples of subject lines: Re: Invoice Missing Inv ####; From [Legitimate Business Name] INV #### New Examples of subject lines: New Message from #### New Scanned Fax Doc-Delivery for #### New FaxTransmission from #### Message Examples of subject lines: Message From #### You have a New Message Telephone Message for #### Required Examples of […]

Phishing: Common Approaches

Phishing is one of the most common cyber threats. The technique is used by cyber criminals with the goal of luring victims into doing exactly what they want. The cyber criminal could be after any kind of data: from birthdates to online banking credentials. Their goal could also be to get their victim to download […]

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Interim pages omitted …
  • Page 27
  • Go to Next Page »

Primary Sidebar

The Latest Posts:

  • The Move to MDR

    The Move to MDR

    July 21, 2025
  • OneDrive Sync with Personal Accounts

    OneDrive Sync with Personal Accounts

    May 19, 2025
  • ITS Completes Annual SOC Audit

    ITS Completes Annual SOC Audit

    May 8, 2025
  • Cookie Choices

    Cookie Choices

    March 3, 2025
  • AI Office Pranks

    AI Office Pranks

    February 4, 2025
  • Why The PowerSchool Breach Matters for Non-School Entities Too

    Why The PowerSchool Breach Matters for Non-School Entities Too

    January 15, 2025
  • Windows 10 End-of-Support

    Windows 10 End-of-Support

    September 20, 2024

Categories

Footer

Contact Us:

319-465-4463

22068 Business Highway 151
Monticello IA 52310

info [at] iowadatacenters.com

Submit a helpdesk ticket to:

helpdesk [at] iowadatacenters.com

Follow Us!

  • Facebook
  • LinkedIn

Remote Support Tool

Helpdesk Request

Copyright © 2025