Information Research Group Inc.

Specializing in technical solutions for small businesses

Technical Support

Cybersecurity

Mobile Support

Cloud Services

 

What We Do

Cloud Services

More Info

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

Cybersecurity

More Info

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Endpoint Protection

More Info

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.

Microsoft Office 365

More Info

Office 365 is a line of subscription services offered by Microsoft as part of the Microsoft Office product line. The brand encompasses plans that allow use of the Microsoft Office software suite over the life of the subscription, as well as cloud-based software as a service products for business environments, such as hosted Exchange Server, Skype for Business Server, and SharePoint.

Phishing Campaigns

More Info

A campaign can consist of either a single phishing test or a recurring series of tests done Weekly, Bi-Weekly, Monthly, or Quarterly. You can choose one or more groups to target or phish all your users. You can also select individual phishing templates for a one-time test or fully randomize the templates so that users are receiving different phishing templates at different times.

WordPress Security

More Info

WordPress is the most popular way to build a website. That popularity has the unfortunate side effect of being a prime target for malicious actors across the world. While WordPress core software is very secure, and it is audited regularly by hundreds of developers, there is a lot that can be done to keep your site secure.

 

Latest 2020 Data Breaches

May 13, 2020: Magellan Health – A Fortune 500 healthcare company, has sent a notice to its patients that it had fallen victim to a phishing scam and ransomware attack. 

May 5, 2020: Fresenius Group – A reported ransomware attack on the Fresenius Group, a global healthcare company and one of the largest dialysis equipment providers in the U.S., impacted the company’s operations around the world.

May 13, 2020: U.S. Marshals Service – The personal information of 387,000 former and current inmates was access by a hacker who exploited a server vulnerability in a U.S. Marshals Service database.

May 4, 2020: GoDaddy – The web hosting site, GoDaddy, announced to its users that an unauthorized third party was granted access to login credentials.