Technology
Your Comprehensive Business Guide To BYOD (Bring Your Own Device) At Your
In recent years, Bring Your Own Device (BYOD) policies have become more common in many offices in all industries. From saving your company money to security management, there’s a lot to consider when you are contemplating whether to allow employees to use their own devices to complete their work. On the surface, it appears to be…
Read MoreBecoming Your Own Security Champion
In the age of ransomware, every position is now a security role. Every member of your team needs to be equipped to identify suspicious emails, know to be wary of unsolicited links, and be passionate stewards for the integrity of your network. Here’s how you can become your own security champion and how you can…
Read MoreHave You Changed Your Password Yet?
If you haven’t changed your password since 2016, then you could be in for trouble. With the amount of breaches surmounting every day, using the same old password could compromise your information… Especially if you use a weak password or reuse the same one between accounts. In December, SplashData released their annual list of the…
Read MorePreventing Identity Theft Through Your Devices
In a world rapidly filling with smart appliances, homes, and cars, staying connected and secure at the same time is becoming increasingly more difficult. The number of phishing campaigns and the latest breaches have made identity theft a top concern, especially after news of the Equifax breach, and smart homes are another opening for risk.…
Read MoreUnderstanding Patch Tuesday And How It Keeps Your Network Updated & Secure
What Is Patch Tuesday? Windows users may be familiar with the term “Patch Tuesday.” This casual phrase is used to describe Microsoft’s regular release of security and other major patches for its software on the second (and occasionally fourth) Tuesday of every month. What does this mean for the average end user? To run updates,…
Read MoreQuestions You Need to Ask Before Selecting a New Software Solution
So, you’ve identified a need for a new software solution. Whether you’re replacing an old one or adding to your technology stack, finding the right one can be a lengthy and arduous process. You want to make the right choice the first time. To help guide you along the journey, here are the questions you…
Read MoreWhat You Need to Know About Spectre and Meltdown
The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches. So, what exactly does this mean for you? Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are…
Read MoreW-2 Phishing Season: How To Prevent These Attacks
Tax season is coming soon, and with it comes W-2 phishing season (and not the bass fishing many in Georgia love). As HR and Accounting departments are preparing tax documents for their employees, cybercriminals are targeting that information using social engineering tactics in phishing emails. (Want to learn more about ransomware and how to keep…
Read MoreOperational Maturity in IT: An Introduction for Executives
What is Operational Maturity? How do you measure it for your organization? Why does it matter, and how can you improve it? Join Rocket IT’s vCIO Eric Henderson on this on-demand webinar to answer these questions and more. Eric Henderson is the virtual CIO for Rocket IT, a technology company based out of Duluth, GA. …
Read More