Scammers Pose as LastPass Support in a New Phishing Campaign | Sync Up
https://youtu.be/JgebOJwSQUs For those who use the password management service, LastPass, be on the lookout for suspicious emails and calls from individuals claiming to be with ...
Read More
FBI Warns of Massive Wave of Road Toll SMS Phishing Attacks | Sync Up
https://youtu.be/d_MXIdcZG0M For commuters, paying road tolls is part of the routine. And because many people might not think too much about paying those fees, scammers ...
Read More
Google Agrees to Delete Incognito Mode Data to Settle Lawsuit | Sync Up
https://youtu.be/5pEayQ6PJCA Does Google Chrome’s Incognito Mode really offer private web browsing? While the answer to that question is a resounding no, we’ll cover the verdict ...
Read More
AT&T Data Breach Leaks Millions of Customer Records Again | Sync Up
https://youtu.be/yWxHh_q_ssA With AT&T announcing a massive data breach, millions of customers are once again left worrying if their information was exposed. We’ll cover the extent ...
Read More
US Sues Apple Over Smartphone Monopoly in Antitrust Case | Sync Up
https://youtu.be/GKqRMW12Pbc The U.S. Department of Justice is suing Apple, claiming the tech giant has monopolized the smartphone market. We’ll cover key points from the DOJ’s ...
Read More
Faster Broadband Internet is Coming | FCC Quadruples the Benchmark | Sync Up
https://youtu.be/oRwksR1Ta58 The definition of broadband internet is changing as the FCC has recently decided to increase the minimum internet speed of US homes and businesses ...
Read More
three team members in an office looking at a computer tablet

Questions You Need to Ask Before Selecting a New Software Solution

Jan 12, 2018

So, you’ve identified a need for a new software solution. Whether you’re replacing an old one or adding to your technology stack, finding the right one can be a lengthy and arduous process. You want to make the right choice the first time. To help guide you along the journey, here are the questions you…

Read More

What You Need to Know About Spectre and Meltdown

Jan 4, 2018

The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches. So, what exactly does this mean for you? Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are…

Read More
two it technicians working on a computer in an office

W-2 Phishing Season: How To Prevent These Attacks

Dec 27, 2017

Tax season is coming soon, and with it comes W-2 phishing season (and not the bass fishing many in Georgia love). As HR and Accounting departments are preparing tax documents for their employees, cybercriminals are targeting that information using social engineering tactics in phishing emails. (Want to learn more about ransomware and how to keep…

Read More

Operational Maturity in IT: An Introduction for Executives

Dec 18, 2017

What is Operational Maturity? How do you measure it for your organization? Why does it matter, and how can you improve it? Join Rocket IT’s vCIO Eric Henderson on this on-demand webinar to answer these questions and more. Eric Henderson is the virtual CIO for Rocket IT, a technology company based out of Duluth, GA. …

Read More

2017 In Review: Proactive

Dec 15, 2017

It’s been a record-breaking year in security with a barrage of ransomware and phishing attacks on the global level threatening organizations. While breaches hit the news networks, the phishing failures and the proactive heroes keeping organizations safe often go unnoticed. (Want to learn more about ransomware and how to keep your organization safe? Get our free Security…

Read More

Proactive (Case Story)

Nov 22, 2017

Your organization is focused on doing what you do best Being able to get work done efficiently and effectively is mission critical, and fulfilling your mission is what matters most. Each person on your team has a role to play that will help you accomplish that mission, and a distraction in any area has a…

Read More

How to Capture Dead Time

Nov 17, 2017

  The average cost of unplanned downtime per minute in 2016 was nearly $9,000 per incident. Your organization doesn’t have to eat the cost of dead time. Download our free whitepaper now to learn five easy steps you can take to capture dead time. From more efficient integration to beating your inbox addiction, this paper gives…

Read More

Advanced Office 365 On-Demand Webinar

Nov 3, 2017

How well do you know Office 365? If you’re looking to use your current subscription to the fullest or just trying to see what all the hype is about, join Rocket IT vCIO Eric Henderson (official Office 365 aficionado) for an Advanced Office 365 webinar. Learn about the best intermediate and advanced features for your organization…

Read More

Bad Rabbit Ransomware Outbreak Targets Users

Oct 25, 2017

A new ransomware known as “Bad Rabbit” is hitting users in the US and several European countries. This malware is a “new and improved” version of the NotPetya ransomware that uses social engineering to trick people into installing it by posing as an Adobe Flash installer. Once downloaded, users have 40 hours to pay up…

Read More
Man thinking at his desk with a computer and papers

The Role of Social Engineering in Cyberattacks — And How To Fight Back

Oct 13, 2017

Almost half of all security breaches are inadvertently caused by employees, according to IBM’s Cyber Security Intelligence Index. With phishing continuing to rise and more industries at risk of cyber-attacks, how does social engineering factor in? Types of Cyberattacks There are four primary types of cyberattacks: ransomware, phishing, spearphishing, and spoofing. Three of these rely…

Read More

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.