What is Zero Trust
The term, “Zero Trust” was coined by Forrester Research analyst and thought-leader John Kindervag, and follows the motto, “never trust, […]
Colonial Pipeline - Worry About Hackers
I don’t have to worry about hackers – I don’t have anything they want/need Most people own cars that need […]
Personal Identity Online Security
How to Protect Your Identity Online – Which Helps Protects Your Employer, Too Everyone should be aware of how to […]
RSAC 2021
RSAC 2021 May 17 -20 Virtual Experience Curciana, President and CSE of Corporate Information Technologies, will be presenting in partnership […]
More advanced Phishing Tactics
75% of organizations around the world experienced a phishing attack in 2020, and 74% of attacks targeting US businesses were successful, Proofpoint […]
The “Social Dilemma” is a documentary mixed with a realistic fiction narrative that was released on the popular streaming service […]
Advanced phishing tactics
91% of data breaches are the direct cause of phishing campaigns This is why it is important for all businesses […]
Will DMARC Help secure my business
Domain–based Message Authentication, Reporting, and Conformance (DMARC) is a standard email authentication method. DMARC can help mail administrators prevent hackers and other attackers from spoofing their […]
Phishing Email Using “finra-online.com” Domain Name
FINRA (Financial Industry Regulatory Authority)warns member firms of an ongoing phishing campaign that involves fraudulent emails stating to be from […]
NIST Social engineering simulation
Simulating social engineering testing will allow your employees to make smarter security decisions, hopefully making your company more secure. CIT […]
Six alarming cybersecurity stats
Here are a few alarming cybersecurity stats that should make you worry. But’s don’t worry CIT is here and can […]
Cyber Kill chain
The easiest way to understand how a cyber attack happens is through The Cyber Kill-chain. What the “cyber kill-chain” does […]
Human Behavior is the key
There’s only two types of companies, the ones that have been hacked and know it and the one that don’t […]
Zero Trust Security
Lawrence Cruciana, President and founder of Corporate information Technologies, will be on speaker on July 8th for ChannelPro’s – SMB […]
Ransomware
It is no secret that cybercriminals are taking advantage of the current technological climate to impose themselves on businesses as […]
Supply Chain Attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply […]
DDoS attacks
“DDoS attack” is a pretty common term in the world of cybersecurity. It’s a term that is heard often in […]
Purr-fect zoom call
Lawyer Rod Ponton day didn’t start correctly , the virtual call was a not a purr-fect zoom meeting. Everyone on […]
New Year ChannelPro 2021
2021 is here, and not a moment too soon! ChannelPro 2021 New Year Special includes Lawrence Cruciana from Corporate Information […]
What Are Your Bad Password Habits?
We all have our own bad habits such as slouching or hitting the snooze button too many times that can […]
Geotagging
Human beings are inherently social creatures and whether it be virtually or physically we all desire to be connected in […]
Cruciana at ChanenelPro’s Cybersecurity Online
Lawrence Cruciana, founder and President of Corporate Information Technologies will be a featured panelist on February 3rd at ChannelPro’s Cybersecurity […]
2020 Phishing Attack Landscape
Cybersecurity Insiders released a report on the 2020 Phishing Attack Landscape Report, which has found increase of phishing attacks in 2020 due to […]
Cookies
When someone says “cookies” your first thought is probably the warm sweet holiday cookies you just had a few days […]
Psychology of Social Engineering Stats
Social engineering is “the use of deception to manipulate individuals into divulging confidential or personal information that could be used […]
Holiday scams 2020
Holiday scams 2020 are in full-force. Don’t become one of the cybercriminals victims today, here are a few tips to […]
Year of the phish 2021
Could 2021 be the “Year of the Phish”? 2020 is coming to the end, so what will 2021 hold for […]
COVID-19 know your facts
Most of us can agree that COVID-19 has made 2020 one of the craziest years a lot of us have […]
psychology of social engineering
Social engineering is one of the greatest threats to cyber security in our everyday lives. Whether that be at the […]
Secure online Holiday Shopping
Tips for secure holiday online shopping this 2020 Holiday season — stay safe before, during and after peak retail season […]
Cybersecurity threats
Passwords Can Be One of Your Biggest Potential Threats Through these statistics from Lastpass we see that oftentimes the biggest […]
Employee Security Training
How much security training is enough for your employees? Security Awareness Training needs to be ongoing, but too much of […]
Passwordless vs password
Simple definition of passwordless authentication is any method of verifying a user without requiring the user to provide a password. […]
Home security
The majority of the work force is working from home which means you need to be concern about your home […]
Be Cyber Smart - Phishing
Be Cyber Smart and Do Your Part: Keep Your Employees Up to Date on Latest Phishing Be cyber smart and […]
Prime Day 2020
Amazon’s Prime Day start tomorrow, Tuesday October 13th Amazon’s Prime Day is October 13th and 14th – are you ready? […]
Cyber Criminal on dark web
The evolution of cyber crime has been rapid and to this day is ever expanding. In the first half of […]
Do Your Part
Humans Can Be Your Weakest Link Do your part – train your humans so they aren’t the weakest link. How? […]
Happy Cybersecurity Awareness Month
October Is Cybersecurity Awareness Month Cybersecurity Awareness Month was launched by the National Cyber Security Alliance (NCSA) and the U.S. […]
MDM Infringing
It is time to ask the question: Is MDM infringing on your privacy? Now more than ever people are starting […]
Business Email Compromise
Business Email Compromise (BEC) scam, criminals send/target an email message that appears to come from a known source making a […]
Security with remote learning
Have your thought about your personal security with remote learning Security is always a big concern in the world of […]
CIT Hole In One
Make A Hole in One for Boys and Girls Club of Piedmont This is Corporate Information Technologies 3rd year participating […]
Mobile Device Management
What is Mobile Device Management(MDM) Mobile Device Management(MDM) most simply put is a software meant for managing laptops, smartphones, tablets, […]
NIST Social engineering simulation
The National Institute of Standards and Technology (NIST) is a non-regulatory agency under the U.S. Department of Commerce that releases […]
Password security
Our passwords are the first line of defense against cyber criminals. It is important to stay up to date on […]
Password security
Making sure your data is protected and secure is not as hard as one may think. Taking simple and smart […]
Password Safety
More often than not the biggest threat to cybersecurity is ourselves. Humans are extremely predictable, and in no other aspect […]
Zero Trust Security
Lawrence Cruciana will be part of ChannelPro Cybersecurity Summit – 5 August 2020. “If you’re not offering security services to your clients […]
Password security
Humans can be the biggest obstacle when it comes to personal password security. Our passwords are often simple,easy to remember […]
Password security
Take a look at CIT’s password security tips for what not to do. Arguably one of the most important aspects […]
MSP Increasing Cyber Risk
Lawrence Cruciana, CEO & CTO of Corporate Information Technologies, is again working with ConnectWise to resolve a flaw in one […]
Phishing for Awareness
Social Media Phishing has rose 74% which is why it is important to familiarize yourself with the most up to […]
Phishing for Awareness
Take a look at Corporate Information Technologies Phishing Awareness Statistics for 2020. Because Phishing attacks are such a prevalent issue […]
Data Breach loss - can you afford it. Need incident response plan!
Is your company prepared for a data loss? Can you afford to have a data breach loss? Close to 40% […]
Reduce Your Attack Surface
What are you doing to reduce your Attack Surface?
Testifying Before Congress
Corporate Information Technologies CTO & Owner Lawrence Cruciana is bringing small business cyber security needs to the national stage working […]
working remaote and keeping your security practices up to date
With many employees still working remote, security should be a top priority. Most companies have had transition from office-to-home working […]
Bitcoin mining
In recent years Bitcoin mining has become an increasingly lucrative practice, but due to the hefty technological demands the cost […]
Cybersecurity Incidents and Covid-19: Be prepared
Check out a couple cybersecurity incidents that have been happening during the coronavirus pandemic: Coronavirus pandemic is correlated with a […]
Search Engine Phishing Attacks
Clone, Man-in-the-Middle & Search Engine Phishing Attacks Week 8 of the Phishing for Awareness blog: Clone, Man-in-the-Middle, and Search Engine […]
Password Signup Sheet
I’m sure you use a password several times on a daily basis. Let’s take a look at some basis tips […]
Malware injection
Malware Injection & Image Phishing Malware Injection Malware, which was mentioned in the subdomain portion of last week’s blog, is […]
Spear Phishing
Spear Phishing & Subdomain Attack Awareness Spear Phishing Spear Phishing is typically an email spoofing attack that targets a specific […]
What Your Business Must Know About Incident Response Your business must be prepared for potential cyber attacks. They happen constantly […]
Social Media Phishing
Mass-Target Brand Impersonations & Social Media Phishing Attacks Mass-Target Brand Impersonations A Mass-Target Brand Impersonation occurs when scammers send a […]
Business Email Compromise
This phishing series blog will explore Business Email Compromise (BEC) Schemes and Website Spoofing. Just to refresh – On last […]
For those using Zoom conduct regular meetings with their staff, vendors, family or friends the sudden security shortcomings of Zoom’s […]
Zero Trust
What Your Business Needs to Know About Security Assessments Cyber attacks pose a risk to all sorts of networks and […]
Phishing attacks
Did you know 76% of businesses reported being a victim of phishing attacks in the last year? With phishing on […]
Different Types of Phishing
Phishing for Awareness: A Series Phishing is no joke. And no, we are not talking about the aspiring sport of […]
Cybersecurity tips during Coronavirus. Three actions every user can take to help secure the corporate information assets.
Cybersecurity tips during Coronavirus. Three actions every user can take to help secure the corporate information assets.
Cybersecurity and working from home may become a necessity in the near future for many companies. With the coronavirus spreading […]
Cybersecurity & Banking Regulations
There is perhaps nowhere in the private sector with stricter regulations than the financial services industry. So, let’s talk about […]
Our Difference Is The Data
Now, let’s talk Log Event Management terms. LMS – “Log Management System” or LEM – “Log Event Management” – a […]
Cybersecurity Forum: discussing the latest surrounding cloud security for financial institutions including methods, controls, challenges and best practices.
On Wednesday, February 5th, six highly intelligent cybersecurity experts joined together at the Cybersecurity Forum for the Delaware Bankers Association […]
Cybersecurity Forum: discussing the latest surrounding cloud security for financial institutions including methods, controls, challenges and best practices.
Lawrence Cruciana, CIT’s Chief Systems Engineer, will be part of the DBA Cybersecurity Forum on Wednesday, February 5th. Delaware Bankers […]
Image of glass sphere on computer keyboard
The awareness of cyber threats have grown rapidly in the recent years. Now, organizations are finally realizing the threat that […]
Personal Cybersecurity
Daily we are tested with our personal information and security Nobody wants their information out there, although with all the […]
Windows 7 is no longer supported/no longer receiving security issues, as of January 14, 2020. More Windows will not be supported throughout 2020
January 14th: Windows 7 is no longer supported/no longer receiving security issues. More Windows will not be supported throughout 2020 […]
‘Tis the season to share and be invited The Emotet Trojan gang has started to send Christmas themed phishing emails […]
When is the last time you did security awareness training?  Do you continue to update and remind employees about your […]
Image of person personifying a hacker in black
Hackers don’t seem to care whether your a large enterprise or a SMB.  Although most SMB don’t have the resources […]
Lawrence Cruciana Presenting at ISSA Charlotte Practical Incident Response Techniques for Smaller Organizations: Lessons Learned In-the-trenches Lawrence Cruciana presenting at […]
Cybersecurity information sharing
Working in a cybersecurity firm that works with a lot of small and mid-size businesses, I see Cyber-insecurity every day. […]
Don’t trust any contact information in an email from a financial institution. Use information you already know is true – […]
Email – It is easy to send information and store information via email. However, no one should be asking for your personal […]
  Similar domains and website cloning as types of phishing are on the rise!   Let’s say your bank is […]
Common Sense Internet Safety Lesson 5 Attachments, Images and Links . . . Oh My Malware.  Malware has been sent […]
Common Sense Internet Safety #1 Some things are not common knowledge, so what is common sense on the internet? We’re […]
If you’re protecting a castle, do you just require a secret password to get into it? NO, you also have […]
  Digital risk is the greatest threat to the modern business   That was the theme at the opening session […]
Previously I discussed that *many* people had followed a link in an email that included a username and a real […]
Corporate Information Technologies, a leading Managed Security Service Provider, today announced that its President and Chief Systems Engineer, Lawrence Cruciana […]
Learn More
error: Alert: This Content is protected!