Technology
CD Projekt Red Breached | How to Protect Your Data
On February 9, 2021, one of today’s most popular video game developers awoke to locked network files and a ransom note.
Here’s how you can learn from their failure and protect your data.
Read MoreNew Exploit | How to Know if Your iPhone Was Hacked
On January 26, 2021, Apple published patch notes that provided insight into three software vulnerabilities that, when daisy-chained together, could give hackers complete control over iPhones and iPads running iOS 14.3 or older.
Read MoreCase Story | Financial Spear Phishing
In 2020, phishing scams involving payment and invoice fraud increased by 112%. But as the social engineering behind these attacks becomes more complex, here’s how one business refused to become a part of the statistic and trained its finance department to become a team of cybersecurity experts.
Read MoreRocket IT Business Podcast | Craig Haynie | Mastering the Pivot | Ep. 20
With a constant drive to innovate and tackle new challenges, CablesandKits CEO, Craig Haynie has become a master of building businesses; helping his online business grow and overcome various challenges since its launch in 2001. And now, in the wake of the COVID pandemic, Craig has once again found new ways to build on the impressive capabilities of his team and online platform.
Read MorePros & Cons of an On-Premise Server
While on-premise servers and cloud platforms both offer the ability to access files remotely, selecting one that properly balances your business’s budget, scalability, and security needs can be a difficult process.
In part one of this video series, Rocket IT will begin to help you navigate the pros and cons of each option, and provide you with the information needed to make a sound choice for your remote file enablement needs.
Read MoreThe Biggest Hack of the Decade | SolarWinds Breach
On December 18, the Cybersecurity and Infrastructure Security Agency notified the public of a wide-spread hack that is believed to have compromised government agencies, critical infrastructures, and private sector organizations across the United States.
Read MoreCase Story | Enhanced Security – Manufacturing
Training employees on the tell-tale signs of a phishing email takes time.
And although many businesses rely on traditional antivirus, firewalls, and spam filters to circumvent the vulnerabilities presented by such threats, one Rocket IT client quickly learned those measures alone are no match for an era of modern attacks.
Read MoreThrive Y’all | Melissa Meeker | An Ecosystem of Water Innovation | Ep 13
While creating a hub for innovation is not for the faint of heart, a dedicated team of pioneers at The Water Tower are looking to accomplish just that with their progressive Gwinnett County campus.
With a mission fueled by imagination and informed by research, CEO, Melissa Meeker is helping both public and private industry leaders reenvision the future of water-saving technology.
Read More