The Importance of Regular IT Audits: Ensuring Compliance and Security
In 2021, a popular information technology (IT) management platform was breached, leaving almost 30 percent of organizations compromised and millions of individuals feeling the ripple ...
Read More
How to Implement a Successful Disaster Recovery Plan for Your Business
Disaster often strikes when it’s least suspected. You may not think your small business needs to be prepared for disruption, but almost two-thirds of businesses ...
Read More
Outlook Easter Eggs: Discovering Microsoft’s Hidden Features
While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within software applications or ...
Read More
CD Projekt Red Breached | How to Protect Your Data
In 2020, one in four cyberattacks were the result of ransomware: a network  hijack capable of locking business out of crucial data for weeks on ...
Read More
Parler Returns to App Store | Previous Breach Leading to Parler’s Demise
Social Media platform, Parler found itself in hot water after its services were used to assist in the planning of the attack on the United ...
Read More
Thrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
https://youtu.be/C5iJ3Z-TIjk With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats ...
Read More

Essential Password Security | Part Two

Sep 15, 2020

In the last video, we left you with a long list of requirements to keep yourself secure.

Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.

Read More

Essential Password Security | Part One | Video Series

Aug 27, 2020

While simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.

Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.

Read More

The 2020 Twitter Bitcoin Scam & the Future of Social Engineering 

Jul 30, 2020

Elon Musk, Bill Gates, Apple, Uber, Jeff Bezos, Barack Obama, and Kanye West: what do they all have in common? Aside from being notable businesses and individuals to audiences across the globe, each of these entities fell victim to a cyber attack that hit Twitter on July 15, 2020.  

On that day, Tweets from the aforementioned accounts and 38 other verified users were posted, offering millions of followers what appeared to be the investment of a lifetime.

Read More

Software to Manage a Remote Workforce | Benefits & Features

May 19, 2020

Whether it’s the recent launch of an international office, a global pandemic, or an occasional period of inclement weather, it’s likely that many businesses will face a day in which remote operations become vital to their financial success.

In this article, Rocket IT aims to equip and educate managers on the technology needed to lead from afar; while also highlighting how productivity tracking software can be used to gamify processes, discover new workflows, build trust, and more.

Read More
Zoom-bombing

How to Prevent Zoombombing | Zoom Settings to Change

Apr 13, 2020

As Zoom’s developers continue to update the back-end security of the video-conferencing application, a slew of welcomed settings give individuals the power to protect their meetings and the discussions held inside. But rather than skimming through a seemingly endless number of patch notes, Rocket IT is here to provide you with a specially curated list of settings to enable; mitigating the risk of Zoombombing and other vulnerabilities.

Read More

Rocket IT Business Podcast | Eric Henderson | A Business Continuity Checklist | Ep 12

Apr 1, 2020

In this episode of the Rocket IT Podcast, the Gwinnett Chamber of Commerce hosts Eric Henderson, Rocket IT’s VP of Technology, to help audience members ensure that technology remains a healthy part their operations.

From this insight, Eric provides audiences with a better understanding of where their next steps should lie, giving them confidence in their business’ productivity and security through this rapid transition to remote working.

Read More

Rocket IT Hosts Webinar to Address Long-Term COVID-19 Considerations

Mar 26, 2020

On Tuesday, March 31st, Rocket IT’s VP of Technology, Eric Henderson will host a webinar with the Gwinnett Chamber of Commerce; helping audience members ensure that technology remains a healthy part of their operations as they adapt to a new normal of conducting business.

Through this webinar, attendees can expect to leave with a better understanding of the next steps to take during this pandemic, and in turn, feel confident in their business’ productivity and security through its rapid transition.

Read More

Technology to Work Remotely | Business Continuity & Disaster Planning

Mar 24, 2020

As the risk of COVID-19 (Coronavirus) continues to grow, organizational leaders have been tasked to develop business continuity plans that facilitate a remote working scenario. And although it’s clear that technology will play a role in maintaining a team’s productivity and success, it’s important that businesses carefully select the technology that best fits their needs and current digital environment.

In light of this, Rocket IT has teamed up with Gateway85 to provide individuals with insight into the various technologies that allow teams to access files, connect to software, and collaborate; all while working from home.

Read More

Avoiding Tax Season Phishing Scams

Feb 27, 2020

With tax season now in full swing, cyber criminals have once again boosted their fraudulent activities; hoping to scam unsuspecting individuals out of well-earned refunds and possibly even their own identities.

But despite the many complex tools scammers can use to gain access to sensitive account information, the sense of urgency around filing taxes creates a breeding ground for successful phishing attacks.

Read More

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.