
Technology
What are ransomware attacks
Ransomware is a form of malware that encrypts files on a device that compromises a system. Malicious actors rely on it for extorting money from individuals or organizations. Typically, hackers first deny access of files to users by encrypting the data. They hold...
Homograph Phishing Attacks: What you need to know
Social engineering continues to be one of the most common cyber-attack strategies. Cybercriminals are constantly evolving their tactics to phish for personal information or to get control of a device. One such tactic is called “homograph” or “homoglyph...
You’re Invited to a Free Virtual Seminar on June 23!
Our Intact Technology team is excited to sponsor “The Ergonomics Blueprint for Tomorrow's Laboratory: Proven Strategies for Smart Lab Managers and Science Decision Makers” presented by Alison Heller-Ono, PT, CPE, and expert in Laboratory Ergonomics. In this virtual...
Rethinking Password Security
Passwords provide the first line of defense when a user wishes to gain access to a device or platform. It is the most used method of security. The stronger your password, the more protected your computer will be from hackers and malicious software. Creating Secure...
Intact Technology’s David Chavez quoted in Independent Agent magazine
As cybercrimes increase worldwide, many small businesses are unprepared to deal with any form of cyberattack. Every year, over 43% of online attacks are on small businesses and only 7% of those businesses are capable of defending or mitigating the cyber threat,...
Beware: Identity Thefts Spike amid Pandemic
Reports of identity thefts skyrocketed in 2020 with 1.4 million cases reported to the Federal Trade Commission – more than double the number in 2019. The grim numbers were a possible result of the global pandemic that provided cybercriminals and identity thieves an...
Intact Technology welcomes Peter Burt as the new RVP for Southwest region
We are pleased to welcome Peter Burt who recently joined our Intact Technology team as Regional Vice President for the Southwest region. Burt has more than 15 years of experience in the insurance industry – working at CNA, Hartford and most recently, Berkley. He has...
Phishing Alert: Beware of Browser Extensions
Browser extensions are small software programs that offer features like filters and controls to change the way a user views web pages and services. They run inside web browsers and enable users to tailor the functionality of a browser. Although these features are...
Chris Moede appointed Technology CUO
We are pleased to announce that Chris Moede has been appointed Chief Underwriting Officer of Intact Technology. Moede joined the company in 2008 as a Technology/Life Sciences Underwriter, managing our central region. From this role he assumed increasing responsibility...
SolarWinds: Supply Chain Attack, Concerns, and Remediation Whitepaper Available
The compromise of the SolarWinds Orion Network Configuration Manager Update has been in the news since its discovery in December 2020. The impact of this cyberattack on a software supply chain (attacking a vendor’s software update build) is quite extensive and poses a...