What Happens When You Download an Email Attachment?

When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?

If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?

Read More

Goodbye, Internet Explorer. Hello, Microsoft Edge.

Since its launch in 1995, Microsoft has struggled to convince people to adopt Internet Explorer. So much so that the browser has even found itself to be the joke of many popular online memes.

But as Microsoft slowly begins to end support for Internet Explorer on November 30, 2020 so it can focus on Edge, how does its newest browser stack up amongst the competition?

Read More

Essential Password Security | Part One | Video Series

While simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.

Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.

Read More

New Malware — Agent Tesla Hits — Recovering Small Businesses

As the US recovers from a second spike in COVID-19 cases, the FBI warns that our current reliance on technology has resulted in a “breathtaking” number of new online scams.

But of those threats, one newly updated virus jeopardizes the livelihood of small businesses that are slowly reopening after the wake of an economic fallout.

Read More

Application Whitelisting and How Your Business Can Benefit From Using It

Application Whitelisting

Although our newfound reliance on remote working has caused a surge in cybersecurity threats, what if we told you that some of the most common attacks are the easiest to prevent?

In this video, Rocket IT provides you with a quick run-down of how application whitelisting can be used to stop malicious attacks dead in their tracks; before they have an opportunity to spread throughout your business network.

Read More

Virtual Activity Ideas For Your Community During The Fourth of July

The first half of 2020 has been a little different from years past. Events, celebrations, and social gatherings have been canceled; placing a strain on those looking for things to do throughout the early months of summer. And now, as the Fourth of July quickly approaches, citizens across Gwinnett County, Georgia, and the entire United States are scrambling to find some fun and safe ways to celebrate Independence Day.  

At Rocket IT, two of our core values are to find a better way and have a blast, and this Fourth of July, we’re giving readers an inside look on some virtual activities to keep the good times afoot.  

Read More