Technology
Black Friday Tech Deals
With so many Black Friday deals already available and more on the way, which technology should you consider purchasing, and what should you hold out on?
To help you decide, Rocket IT has prepared a 2020 Black Friday buying guide; highlighting the best offers on some of our team’s favorite pieces of technology.
Read MoreThrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats that you may unknowingly come in contact with on a daily basis.
In this episode of Thrive Y’all, we sit down with two of Rocket IT’s in-house security experts, Eric Henderson and Patrick Richardt.
Read MoreUnited States Charges Russian Hackers
Recently, the United States Department of Justice charged six Russian military officials for conspiring in a Russian cyberwarfare operation known as Sandworm.
Now, those allegations have reached the public eye and Russia is being held responsible for sabotaging national economies, interrupting government elections, covering up weapon testing, and more.
Read MoreWhat Are Zombie Computers & How Do They Create A Zombie Network?
Do you sometimes think your computer has a mind of its own? As it turns out, it just might!
With Halloween right around the corner, here’s a spooky tale of zombie viruses, and how hackers are using this form of malware to take complete control of technologies and their resources.
Read MoreWhat Happens When You Download an Email Attachment?
When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?
If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?
Read MoreEssential Password Security | Part Three | Video Series
So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.
Now it’s time to learn how to create, store, and access all the rest of your passwords.
Read MoreEssential Password Security | Part Two
In the last video, we left you with a long list of requirements to keep yourself secure.
Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.
Read MoreGoodbye, Internet Explorer. Hello, Microsoft Edge.
Since its launch in 1995, Microsoft has struggled to convince people to adopt Internet Explorer. So much so that the browser has even found itself to be the joke of many popular online memes.
But as Microsoft slowly begins to end support for Internet Explorer on November 30, 2020 so it can focus on Edge, how does its newest browser stack up amongst the competition?
Read MoreEssential Password Security | Part One | Video Series
While simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.
Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.
Read More