What You Need to Know About Spectre and Meltdown

The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches. So, what exactly does this mean for you? Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are…

Read More

W-2 Phishing Season: How To Prevent These Attacks

two it technicians working on a computer in an office

Tax season is coming soon, and with it comes W-2 phishing season (and not the bass fishing many in Georgia love). As HR and Accounting departments are preparing tax documents for their employees, cybercriminals are targeting that information using social engineering tactics in phishing emails. (Want to learn more about ransomware and how to keep…

Read More

Operational Maturity in IT: An Introduction for Executives

What is Operational Maturity? How do you measure it for your organization? Why does it matter, and how can you improve it? Join Rocket IT’s vCIO Eric Henderson on this on-demand webinar to answer these questions and more. Eric Henderson is the virtual CIO for Rocket IT, a technology company based out of Duluth, GA. …

Read More

2017 In Review: Proactive

It’s been a record-breaking year in security with a barrage of ransomware and phishing attacks on the global level threatening organizations. While breaches hit the news networks, the phishing failures and the proactive heroes keeping organizations safe often go unnoticed. (Want to learn more about ransomware and how to keep your organization safe? Get our free Security…

Read More

Advanced Office 365 On-Demand Webinar

How well do you know Office 365? If you’re looking to use your current subscription to the fullest or just trying to see what all the hype is about, join Rocket IT vCIO Eric Henderson (official Office 365 aficionado) for an Advanced Office 365 webinar. Learn about the best intermediate and advanced features for your organization…

Read More

Bad Rabbit Ransomware Outbreak Targets Users

A new ransomware known as “Bad Rabbit” is hitting users in the US and several European countries. This malware is a “new and improved” version of the NotPetya ransomware that uses social engineering to trick people into installing it by posing as an Adobe Flash installer. Once downloaded, users have 40 hours to pay up…

Read More

The Role of Social Engineering in Cyberattacks — And How To Fight Back

Man thinking at his desk with a computer and papers

Almost half of all security breaches are inadvertently caused by employees, according to IBM’s Cyber Security Intelligence Index. With phishing continuing to rise and more industries at risk of cyber-attacks, how does social engineering factor in? Types of Cyberattacks There are four primary types of cyberattacks: ransomware, phishing, spearphishing, and spoofing. Three of these rely…

Read More

Our Recommended Top Eight Collaboration Tools

team collaborating at a desk with pens and a laptop

Collaboration is key here at Rocket IT, like it is at many organizations. But when you have team members at client sites, working from home, and glued to the office, effective collaboration is a little harder than it is when you have everyone in the same room. To help your team thrive when collaborating in…

Read More