Copy
Welcome to Your Monthly IQ newsletter! We hope you will find something helpful as you scan our topics below. If you've seen our Social Media you know that October is Cybersecurity Awareness month. But while October is ending, we hope you will continue strong cyber protections. After all, Jiang Lizhi and cohorts are still out there!


In this issue:
How IQ helped Cedar Lake improve IT planning
Arctic Wolf: Our choice for regulated companies

7 ways to tell if your IT vendor is a true partner

Do you know the biggest myth of CyberSecurity?
Improve Your Tech IQ!
Meet an FBI Cybercriminal: Jiang Lizhi
How IQ helped Cedar Lake improve IT planning
Louisville, KY- based Cedar Lake is a non-profit serving intellectually and developmentally disabled individuals. When turnover left their technology department without strong direction, Cedar Lake turned to ImageQuest to help it get its IT systems back on track. Click on the video image to hear from Cedar Lake's President & CEO, the Chief Operating Officer, and an IT staffer who works directly with us.

Arctic Wolf: Our choice for regulated companies

Today’s world includes unrelenting attempts by hackers, some sponsored by foreign countries, to steal data, damage systems, and halt operations.

We recommend a layered defense to stop as many attacks as possible. This includes a monitoring and rapid response solution for when an attack gets past your perimeter.
Learn why Arctic Wolf is our choice for that solution.

 
7 ways to tell if your IT vendor is a true partner
Have you ever dreamed of a business relationship in which a vendor helps your organization take the right steps to grow? If you haven't experienced this, you may be seeking a partner relationship with an entity that is really a supplier.

A partner relationship with a vendor can be a beautiful thing. But as with any dedicated relationship, you need to choose the right partner. Here are seven ways to tell if you have the right IT partner.
Do you know the biggest myth of Cybersecurity?
Many of us wish Cybersecurity was a "set it and forget it" task. But unfortunately, the reality is your cybersecurity efforts are never done.
The good guys erect barriers that work, then the bad guys find new ways to get in. Unfortunately, both sides practice "kaizen" - continuous improvement - making cybersecurity a journey rather than a destination.
 
How to invite external attendees to your internal Teams meeting

Did you know? Someone from outside your organization can participate in your meeting via Microsoft Teams.

Teams is part of the M365 suite most people know as Office 365. M365 provides a more secure environment for internal collaboration and communication, but people outside your organization can participate through invitation.  Learn how.

 


Meet an FBI Cybercriminal: JIANG LIZHI

Jiang Lizhi, 35, is a Vice President at a company called Chengdu 404 Network Technology Company Ltd. in  China’s Sichuan province. Chengdu 404 bills itself as a network security company, providing defensive measures and data analytics services.

However, the FBI says Chengdu 404 is a home for hackers working for China's Ministry of State Security.  The U.S. calls these hackers APT41, for Advanced Persistent Threat 41. APT41 has quite a resume. 
LinkedIn
Twitter
Website
YouTube
Google Plus
Copyright © 2020 ImageQuest, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.

Email Marketing Powered by Mailchimp