Technology
Case Story | Enhanced Security – Manufacturing
Training employees on the tell-tale signs of a phishing email takes time.
And although many businesses rely on traditional antivirus, firewalls, and spam filters to circumvent the vulnerabilities presented by such threats, one Rocket IT client quickly learned those measures alone are no match for an era of modern attacks.
Read MoreThrive Y’all | Melissa Meeker | An Ecosystem of Water Innovation | Ep 13
While creating a hub for innovation is not for the faint of heart, a dedicated team of pioneers at The Water Tower are looking to accomplish just that with their progressive Gwinnett County campus.
With a mission fueled by imagination and informed by research, CEO, Melissa Meeker is helping both public and private industry leaders reenvision the future of water-saving technology.
Read MoreBlack Friday Tech Deals
With so many Black Friday deals already available and more on the way, which technology should you consider purchasing, and what should you hold out on?
To help you decide, Rocket IT has prepared a 2020 Black Friday buying guide; highlighting the best offers on some of our team’s favorite pieces of technology.
Read MoreThrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats that you may unknowingly come in contact with on a daily basis.
In this episode of Thrive Y’all, we sit down with two of Rocket IT’s in-house security experts, Eric Henderson and Patrick Richardt.
Read MoreUnited States Charges Russian Hackers
Recently, the United States Department of Justice charged six Russian military officials for conspiring in a Russian cyberwarfare operation known as Sandworm.
Now, those allegations have reached the public eye and Russia is being held responsible for sabotaging national economies, interrupting government elections, covering up weapon testing, and more.
Read MoreWhat Are Zombie Computers & How Do They Create A Zombie Network?
Do you sometimes think your computer has a mind of its own? As it turns out, it just might!
With Halloween right around the corner, here’s a spooky tale of zombie viruses, and how hackers are using this form of malware to take complete control of technologies and their resources.
Read MoreWhat Happens When You Download an Email Attachment?
When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?
If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?
Read MoreEssential Password Security | Part Three | Video Series
So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.
Now it’s time to learn how to create, store, and access all the rest of your passwords.
Read MoreEssential Password Security | Part Two
In the last video, we left you with a long list of requirements to keep yourself secure.
Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.
Read More