Blog

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Create a Risk Management Process for Your Cybersecurity

How to Create a Risk Management Process for Your Cybersecurity

We’ve been known to take a bit of an extreme approach to cybersecurity—your business is at constant threat of being attacked by all manners of threats and all that. While we stand by this approach as an effective way to boost awareness and adherence to cybersecurity needs, there are certain attacks that are more likely to target you. This is where risk management comes into play.

0 Comments
Continue reading

5 Steps You Can Take to Keep Your Network and Data Secure

5 Steps You Can Take to Keep Your Network and Data Secure

Businesses today have to deal with more potential problems than in any time in history. They are dealing with cost increases at every turn, personnel shortages, and a regulatory landscape that is always evolving. One of the biggest issues that can have a negative effect on a business is not having the processes and resources in place and working to secure its data and network. Today, we will look at five suggestions that can work to help your business keep its network and data more secure. 

0 Comments
Continue reading

The Pros and Cons of Utilizing the Internet of Things

The Pros and Cons of Utilizing the Internet of Things

A lot has been made about the Internet of Things (IoT) over the past couple of years. People have been purchasing technology they can control from their phones or from centralized smart hubs and it has resulted in a shift to the way people interact with technology. For modern businesses this can bring several pros and cons to the table. This month we thought we would take a brief look at some of the pros and cons of deploying IoT technology in the workplace. 

0 Comments
Continue reading

What Most Often Leads to a Data Breach?

What Most Often Leads to a Data Breach?

Data breaches—any event where a business’ confidential data is viewed, copied, or stolen by an unauthorized person or party—are a serious problem. Unfortunately, they are also a serious problem that can be caused by no shortage of situations. Let’s review some of the causes of business data breaches so you’ll know what to keep an eye out for.

0 Comments
Continue reading

While Fun, Those Social Media Quizzes Can be Dangerous

While Fun, Those Social Media Quizzes Can be Dangerous

We’ve all seen our friends and family sharing quizzes on their social media profiles, prompting people to find out what their celebrity stage name or what Hogwarts house you would be in, or to share what their first concert experience was. These fun, lighthearted quizzes are a great way to get to know a little more about the people we’re connected with… and that’s the biggest problem.

0 Comments
Continue reading

Ransomware Isn’t the Only Malware You Need to Know

Ransomware Isn’t the Only Malware You Need to Know

Network security could mean any number of things, but more often than not, people are using the term as a blanket statement against the dreaded idea of malware and its many forms. Today, we are discussing how vast the world of malware can be and how often you might find yourself misunderstanding what it exactly is. Knowing all this can help you identify if you have become a malware victim or not.

0 Comments
Continue reading

Tip of the Week: Examining NIST’s Definition of Zero Trust

Tip of the Week: Examining NIST’s Definition of Zero Trust

Let me ask you something: how many people do you fundamentally trust? Well, in a zero trust network, that number is reduced to zero. The idea of such a network is that everyone, whether they’re operating inside of the network or out, needs to be verified… and as you might imagine, it has proven effective in preventing data breaches. 

0 Comments
Continue reading

Could Your IT Repair Itself After a Cyberattack?

Could Your IT Repair Itself After a Cyberattack?

Cybersecurity is a massively important consideration for today’s businesses, and as a result, managing it is often given a considerable amount of time. However, recent developments suggest that this time can potentially be reduced by the use of “self-healing” security software. We know that this sounds a little out there, but stay with us! We’ll explain.

0 Comments
Continue reading

Four Considerations for Your Business’ Security

Four Considerations for Your Business’ Security

Millions of people find themselves sitting in front of a computer moving files around and corresponding with people over the phone, through email, or updating info in the company’s line of business app. What many of them don’t know, however, is that, at any time, they are only a couple of clicks away from causing major problems for their company. This is why it is extremely important to train your staff on what to look for and how to address those situations when they do arise.

0 Comments
Continue reading

Ransomware Has Gotten So Bad, It’s Aligned with Terrorism

Ransomware Has Gotten So Bad, It’s Aligned with Terrorism

Ransomware has rapidly progressed from an irritating annoyance to a legitimate global threat, with the U.S. Justice Department officially going on the record and establishing that future ransomware investigations will be handled the same way that terrorism cases are now. Let’s review the reasons behind this policy change and how your business should respond.

0 Comments
Continue reading

Cybersecurity Lessons to Be Learned from the Colonial Pipeline Attack

Cybersecurity Lessons to Be Learned from the Colonial Pipeline Attack

Headlines have been filled with news pertaining to the recent hack of Colonial Pipeline, which has created significant gasoline shortages up the east coast of the nation. While the pipeline has been restored, the way this was accomplished sets a dangerous precedent. On top of this, the attack seems to have set off bigger infrastructural changes in the political space.

0 Comments
Continue reading

Cyberattack Discovery Time is Decreasing (But This Isn’t All Good News)

Cyberattack Discovery Time is Decreasing (But This Isn’t All Good News)

Research has revealed that cyberattacks are spending decreasing amounts of time on their targeted networks before they are discovered. While this may sound like a good thing—a faster discovery of a threat is better than a slower one, after all—this unfortunately is not the case.

0 Comments
Continue reading

Cybersecurity Tools Every Business Should Have

Cybersecurity Tools Every Business Should Have

We typically like to remind people as much as we can of the importance of staying up-to-date with your organization’s cybersecurity. There are plenty of things you can do to strengthen your grip on your network. This month we thought we’d go over some of the solutions we offer to help our clients secure their network and infrastructure. 

0 Comments
Continue reading

SolarWinds Hack - Everything You Need to Know About The Largest Cyber Attack of All Time

SolarWinds Hack - Everything You Need to Know About The Largest Cyber Attack of All Time

True to form, 2020 has given us a final parting gift: the news that the United States was targeted this year by the biggest cyberespionage attack ever. Let’s go into the ramifications of this attack, and what it should teach us going forward.

0 Comments
Continue reading

How to Monitor Your Employees’ Activities without Crossing Any Lines

How to Monitor Your Employees’ Activities without Crossing Any Lines

Of all the contentious topics in the workplace, employee monitoring is among the most divisive. As an authority figure in your business, it is only natural that you would want to make sure that your team is working diligently—especially as they are working remotely. That being said, there are some lines that cannot be crossed you should be aware of. Let’s discuss the concept of monitoring your employees and what cannot be done.

0 Comments
Continue reading

Four Key Components of Successful Network Security

Four Key Components of Successful Network Security

Nowadays, a business’ network security needs to be amongst its top priorities if it is to have any chance of operating without undue risk of data breaches and other incidents. Admittedly, managing this sounds like a Herculean task, but a few relatively simple implementations can help give your security a considerable advantage as you lock down your business’ future. Here, we’ve reviewed four such areas you need to focus on.

0 Comments
Continue reading

Are VPNs Really Secure?

Are VPNs Really Secure?

We’ve not been shy about promoting the use of VPNs (virtual private networks) as a means of protecting your security while you are online. However, we wanted to take a bit of time to specify what a VPN can - and cannot - do to help you.

0 Comments
Continue reading

Cybersecurity Takes Effort at 3 Levels

Cybersecurity Takes Effort at 3 Levels

The way people talk about cybersecurity, it’s as if it is something like a television or a new phone: something you can just buy. That’s not the truth. When you are seriously looking at how you can keep unwanted entities off your network, while having control over what you do with your technology, you need to look at it as three levels of security.

0 Comments
Continue reading

Tip of the Week: Monitor Your Hardware While Out of the Office

Tip of the Week: Monitor Your Hardware While Out of the Office

Businesses are just now starting to reopen as stay-at-home orders are lapsing or going to lapse. For many of those businesses, remote solutions have got them through this ordeal and for many others they continue to deploy a remote workforce. For companies still promoting telework, monitoring your local IT environment is something that you need a solution for. For this week’s tip, we’ll discuss some of the best practices you can use to monitor your IT while out of the office.

0 Comments
Continue reading

Tip of the Week: How to Improve Your Access Control

Tip of the Week: How to Improve Your Access Control

There is no denying that a business’ security--notably, its access control--is absolutely crucial to consider. Here, we’re offering a few tips to help you improve your business’ security through improvements to your access controls and their policies.

0 Comments
Continue reading

Customer Login

News & Updates

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Contact us

Learn more about what Argentum IT can do for your business.

Argentum IT
1141 S. 2nd Street
Louisville, Kentucky 40203

Copyright Argentum IT. All Rights Reserved.