Posts by Chris Swinson
New Malware — Agent Tesla Hits — Recovering Small Businesses
As the US recovers from a second spike in COVID-19 cases, the FBI warns that our current reliance on technology has resulted in a “breathtaking” number of new online scams.
But of those threats, one newly updated virus jeopardizes the livelihood of small businesses that are slowly reopening after the wake of an economic fallout.
Read MoreApplication Whitelisting and How Your Business Can Benefit From Using It
Although our newfound reliance on remote working has caused a surge in cybersecurity threats, what if we told you that some of the most common attacks are the easiest to prevent?
In this video, Rocket IT provides you with a quick run-down of how application whitelisting can be used to stop malicious attacks dead in their tracks; before they have an opportunity to spread throughout your business network.
Read MoreThe 2020 Twitter Bitcoin Scam & the Future of Social Engineering
Elon Musk, Bill Gates, Apple, Uber, Jeff Bezos, Barack Obama, and Kanye West: what do they all have in common? Aside from being notable businesses and individuals to audiences across the globe, each of these entities fell victim to a cyber attack that hit Twitter on July 15, 2020.
On that day, Tweets from the aforementioned accounts and 38 other verified users were posted, offering millions of followers what appeared to be the investment of a lifetime.
Read MoreBria Soyele and Rocket IT Finalists for Moxie Awards
The Gwinnett Chamber of Commerce’s third annual Moxie Awards offer an opportunity to celebrate women who are making notable impacts in the Gwinnett community and beyond.
Recognized as area leaders, both Rocket IT and Rocket IT Service Manager, Bria Soyele are final contenders for the following award categories: ‘Enlightened Employer’ and ‘On the Rise’.
Read MoreRocket IT Business Podcast | Dan Frey | Overcoming Obstacles To Facilitate Growth | Ep 16
In this segment of the Rocket IT Business Podcast, guest host Dan Frey sits down with the visionaries behind Rocket IT, Matt and Maureen Hyatt. Throughout their discussion, Matt and Maureen reflect on their journey to craft a successful business and how they continue to innovate 25 years later.
Read MoreVirtual Activity Ideas For Your Community During The Fourth of July
The first half of 2020 has been a little different from years past. Events, celebrations, and social gatherings have been canceled; placing a strain on those looking for things to do throughout the early months of summer. And now, as the Fourth of July quickly approaches, citizens across Gwinnett County, Georgia, and the entire United States are scrambling to find some fun and safe ways to celebrate Independence Day.
At Rocket IT, two of our core values are to find a better way and have a blast, and this Fourth of July, we’re giving readers an inside look on some virtual activities to keep the good times afoot.
Read MoreCOVID-19 Exposure Logging | Are Apple & Google Tracking Your Health?
Over the last few days, you may have heard news of Apple and Google pushing a new feature across iPhone and Android devices with the intent to better track the spread of COVID-19. But what does this feature really do and is your privacy at risk?
Read MoreRansomware Targeting Remote Small Business Workers
While making the shift to remote work in response to COVID-19, the global software development firm known as Sapiens International was hit with a cybersecurity breach; resulting in $250,000 in lost revenue.
Although the organization has yet to officially report the situation to American exchange authorities, this event should stand as a precautionary warning to businesses with lax security policies for remote workers.
Read MoreRocket IT Business Podcast | Eric Henderson | The Anatomy of a Hack | Ep 15
Last year, around 1,500 major business data breaches and countless smaller ones occurred in the U.S. alone. Interested in learning what caused a majority of these attacks? In this episode of the Rocket IT Business Podcast, our in-house cybersecurity expert provides audiences with the inside scoop on a slew of new and unusual threats hacking groups are using to infiltrate business networks.
Read More