Questions You Need to Ask Before Selecting a New Software Solution
So, you’ve identified a need for a new software solution. Whether you’re replacing an old one or adding to your technology stack, finding the right one can be a lengthy and arduous process. You want to make the right choice the first time. To help guide you along the journey, here are the questions you…
Read MoreWhat You Need to Know About Spectre and Meltdown
The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches. So, what exactly does this mean for you? Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are…
Read MoreW-2 Phishing Season: How To Prevent These Attacks
Tax season is coming soon, and with it comes W-2 phishing season (and not the bass fishing many in Georgia love). As HR and Accounting departments are preparing tax documents for their employees, cybercriminals are targeting that information using social engineering tactics in phishing emails. (Want to learn more about ransomware and how to keep…
Read MoreOperational Maturity in IT: An Introduction for Executives
What is Operational Maturity? How do you measure it for your organization? Why does it matter, and how can you improve it? Join Rocket IT’s vCIO Eric Henderson on this on-demand webinar to answer these questions and more. Eric Henderson is the virtual CIO for Rocket IT, a technology company based out of Duluth, GA. …
Read More2017 In Review: Proactive
It’s been a record-breaking year in security with a barrage of ransomware and phishing attacks on the global level threatening organizations. While breaches hit the news networks, the phishing failures and the proactive heroes keeping organizations safe often go unnoticed. (Want to learn more about ransomware and how to keep your organization safe? Get our free Security…
Read MoreProactive (Case Story)
Your organization is focused on doing what you do best Being able to get work done efficiently and effectively is mission critical, and fulfilling your mission is what matters most. Each person on your team has a role to play that will help you accomplish that mission, and a distraction in any area has a…
Read MoreHow to Capture Dead Time
The average cost of unplanned downtime per minute in 2016 was nearly $9,000 per incident. Your organization doesn’t have to eat the cost of dead time. Download our free whitepaper now to learn five easy steps you can take to capture dead time. From more efficient integration to beating your inbox addiction, this paper gives…
Read MoreAdvanced Office 365 On-Demand Webinar
How well do you know Office 365? If you’re looking to use your current subscription to the fullest or just trying to see what all the hype is about, join Rocket IT vCIO Eric Henderson (official Office 365 aficionado) for an Advanced Office 365 webinar. Learn about the best intermediate and advanced features for your organization…
Read MoreBad Rabbit Ransomware Outbreak Targets Users
A new ransomware known as “Bad Rabbit” is hitting users in the US and several European countries. This malware is a “new and improved” version of the NotPetya ransomware that uses social engineering to trick people into installing it by posing as an Adobe Flash installer. Once downloaded, users have 40 hours to pay up…
Read MoreThe Role of Social Engineering in Cyberattacks — And How To Fight Back
Almost half of all security breaches are inadvertently caused by employees, according to IBM’s Cyber Security Intelligence Index. With phishing continuing to rise and more industries at risk of cyber-attacks, how does social engineering factor in? Types of Cyberattacks There are four primary types of cyberattacks: ransomware, phishing, spearphishing, and spoofing. Three of these rely…
Read More