Blog

Check out our latest news and I.T. insights from the ICS team

Get Started

Mobile Device Security

  User data is a major target of cybercriminals— everything from credit card and banking credentials to email passwords and contact lists. Victims have been baited into downloading adware or subscribing to paid services which ultimately end up hacking their information.  Mobile device security is more important than ever. Most businesses are investing in protecting […]

Customer Testimonial: Colby Clark with Feldmeier Equipment

  Feldmeier Equipment has become a respected supplier to some of the most elite companies worldwide in their respective trades. From pharmaceutical, biotech, and cosmetic clients to brewers and food, dairy, and beverage processing facilities, the Feldmeier name has become a trusted resource for quality, dependable stainless steel processing equipment. We are proud to say […]

The Do’s and Don’ts for Online Holiday Shopping

We all enjoy the convenience of online shopping during the Holidays, but it’s even more convenient for hackers to take advantage of the online shopper. While people are shopping for bargains during the Holidays, they often don’t take precautions when clicking on links or pay attention to what sites they are being redirected to. Some of […]

Are there monsters lurking in your office?

    In the age of hacking, phishing, and social engineering, it’s easy to forget about physical or environmental security. But physical security is as important as its logical cybersecurity counterpart. Protecting employee safety, essential data, confidential information, networks, software, equipment, facilities, and company assets is what physical security is about. You’ve read about the […]

Ghouls, goblins and the living dead can all send a chill down one’s spine. Ransomware, for some people, is even scarier.

    Ghouls, goblins and the living dead can all send a chill down one’s spine. Ransomware, for some people, is even scarier.  So, what exactly is Ransomware?  Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. The data is […]

Trick Or Treat? Beware, not all emails are really giving away free candy.

    Although there are numerous types of phishing strategies, email phishing has proven year over year to be the most effective method attackers are gaining unauthorized access into your systems. What exactly is email phishing? Phishing is a type of social engineering attack often used to steal user data such as login credentials (usernames […]