Best Practices
Essential Password Security | Part Three | Video Series
So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.
Now it’s time to learn how to create, store, and access all the rest of your passwords.
Read MoreEssential Password Security | Part Two
In the last video, we left you with a long list of requirements to keep yourself secure.
Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.
Read MoreEssential Password Security | Part One | Video Series
While simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.
Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.
Read MoreThe 2020 Twitter Bitcoin Scam & the Future of Social Engineering
Elon Musk, Bill Gates, Apple, Uber, Jeff Bezos, Barack Obama, and Kanye West: what do they all have in common? Aside from being notable businesses and individuals to audiences across the globe, each of these entities fell victim to a cyber attack that hit Twitter on July 15, 2020.
On that day, Tweets from the aforementioned accounts and 38 other verified users were posted, offering millions of followers what appeared to be the investment of a lifetime.
Read MoreSoftware to Manage a Remote Workforce | Benefits & Features
Whether it’s the recent launch of an international office, a global pandemic, or an occasional period of inclement weather, it’s likely that many businesses will face a day in which remote operations become vital to their financial success.
In this article, Rocket IT aims to equip and educate managers on the technology needed to lead from afar; while also highlighting how productivity tracking software can be used to gamify processes, discover new workflows, build trust, and more.
Read MoreCoronavirus Stimulus Check Scams | What You Need to Know
Training employees on the tell-tale signs of a phishing email isn’t a one-time deal. Cybercriminal groups are creative, continuously altering phishing campaigns to align with current events.
In light of the ongoing pandemic, Rocket IT is determined to help audiences vigilantly identify new scams pertaining to the spread of COVID-19, the status of stimulus checks, and the reopening of the economy.
Read MoreHow to Prevent Zoombombing | Zoom Settings to Change
As Zoom’s developers continue to update the back-end security of the video-conferencing application, a slew of welcomed settings give individuals the power to protect their meetings and the discussions held inside. But rather than skimming through a seemingly endless number of patch notes, Rocket IT is here to provide you with a specially curated list of settings to enable; mitigating the risk of Zoombombing and other vulnerabilities.
Read MoreRocket IT Business Podcast | Eric Henderson | A Business Continuity Checklist | Ep 12
In this episode of the Rocket IT Podcast, the Gwinnett Chamber of Commerce hosts Eric Henderson, Rocket IT’s VP of Technology, to help audience members ensure that technology remains a healthy part their operations.
From this insight, Eric provides audiences with a better understanding of where their next steps should lie, giving them confidence in their business’ productivity and security through this rapid transition to remote working.
Read MoreRocket IT Hosts Webinar to Address Long-Term COVID-19 Considerations
On Tuesday, March 31st, Rocket IT’s VP of Technology, Eric Henderson will host a webinar with the Gwinnett Chamber of Commerce; helping audience members ensure that technology remains a healthy part of their operations as they adapt to a new normal of conducting business.
Through this webinar, attendees can expect to leave with a better understanding of the next steps to take during this pandemic, and in turn, feel confident in their business’ productivity and security through its rapid transition.
Read More