The Importance of Regular IT Audits: Ensuring Compliance and Security
In 2021, a popular information technology (IT) management platform was breached, leaving almost 30 percent of organizations compromised and millions of individuals feeling the ripple ...
Read More
How to Implement a Successful Disaster Recovery Plan for Your Business
Disaster often strikes when it’s least suspected. You may not think your small business needs to be prepared for disruption, but almost two-thirds of businesses ...
Read More
Outlook Easter Eggs: Discovering Microsoft’s Hidden Features
While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within software applications or ...
Read More
CD Projekt Red Breached | How to Protect Your Data
In 2020, one in four cyberattacks were the result of ransomware: a network  hijack capable of locking business out of crucial data for weeks on ...
Read More
Parler Returns to App Store | Previous Breach Leading to Parler’s Demise
Social Media platform, Parler found itself in hot water after its services were used to assist in the planning of the attack on the United ...
Read More
Thrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
https://youtu.be/C5iJ3Z-TIjk With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats ...
Read More

Five Ways to Get into Fifth Gear in the Office

Jul 8, 2016

At Rocket IT, we’ve adopted the Five Gears practice created by our friends at GiANT Worldwide to help us communicate better with each other in the office. If you’re not familiar with the tool, the five gears represent different modes any one of us is in at any point throughout the day. Each gear represents…

Read More

Seven Password Mistakes and How to Avoid Them

Jun 15, 2016

A different security breach hits the headlines on an almost daily basis. While you may not be too concerned about the safety of your LinkedIn profile after a quick password reset, you may still be committing some of the most common password mistakes. We’re sure your password is more secure than “password” (especially after our…

Read More
Digital folder icon

The Importance of Documentation For Your Network

May 27, 2016

You have a newsletter that goes out to all your clients and community fans every month. You have sales prospects that you keep tabs on and check-in with. You have a history of your interactions with your clients within your client relationship management (CRM) software.  But do you actually have these processes documented? There’s a…

Read More
should I open this attachment? Email safety

When You Get An Attachment In An Email, The Safest Thing To Do Is…?

May 13, 2016

With the rise of ransomware arriving infiltrating inboxes all over the world, through innocuous-looking email attachments, it’s important to know how to keep your network secure. When you get an attachment in an email the safest thing to do is follow these best practices to keep your system and your data safe from malicious programs…

Read More
outlook 2016 - calendar scheduling function screenshot

Using Outlook Calendar For Effective Large Group Scheduling

Apr 15, 2016

Outlook’s scheduling functions are entirely underutilized. The problem? Many people aren’t aware of the advanced capabilities Outlook Calendar has or how much easier it is to use shared calendar scheduling. Outlook is here to help do the heavy lifting for you. Large Group Outlook Scheduling Foundation To lay a foundation, the first place to start…

Read More

I Was Sold the Right Service at the Right Time

Mar 24, 2016

Salespeople. I am one, so I’m keenly aware of the truth in this statement: “No one likes to be sold, but everyone likes to buy.” Recently, I went to an oil change place near my office. Why did I go? Because I needed my oil changed. Also, they had good online reviews and were convenient.…

Read More

What Mac Users Should Know About the New Ransomware

Mar 11, 2016

Mac users beware, you’re no longer safe from ransomware. The ransomware dubbed KeRanger recently hit Macs, infecting about 6,000 computers before it was caught and shut down. While this isn’t the first virus aimed at Macs, this is the first one that has gotten through Apple’s defenses. The KeRanger ransomware is a Mac version of…

Read More

Keeping Out Locky Ransomware

Feb 25, 2016

“Locky” is the newest villain on the Ransomware scene. Since Hollywood Hospital fell prey to the hackers, the tech world has been on high alert. So how does such a high-profile organization become a victim to ransomware like Locky? The virus disguises itself in a Word document attached to an email. The Word document itself…

Read More

Your Guide To Social Media Marketing — And How To Stay Secure While Doing It

Jan 6, 2016

Social media marketing is a hallmark of just about every marketing campaign run. In this article, we’ll shed some insights, share some resources, and give you some tips for securely managing your social channels. Here’s specifically what we’ll cover. Is One Social Network Enough? Six Ways to Expand Your Message on Social Media Gary Vaynerchuk…

Read More

From Intern to Full-Time: Why Your Employee Onboarding Process is Crucial to Success

Dec 23, 2015

How to stand out to potential new employees has been a topic before on the Rocket IT blog – through benefits from working remotely to building programs that help them thrive. But there is another way outside of the working hours of 9-5 to help your employees and attract the rockstars you’re looking for. Investing…

Read More

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.