Thrive Gwinnett | An Ecosystem of Water Innovation
https://youtu.be/zlNiQDl7Um8 While creating a hub for innovation is not for the faint of heart, a dedicated team of pioneers at The Water Tower are accomplishing ...
Read More
Black Friday Tech Deals
With health precautions limiting Black Friday activities at many brick-and-mortar locations, retailers have been forced to offset in-person crowds with more impressive online sales. And ...
Read More
Thrive Gwinnett | Cybersecurity Awareness Month
https://youtu.be/C5iJ3Z-TIjk With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats ...
Read More
United States Charges Russian Hackers
On October 15, 2020, the United States Department of Justice charged six Russian military officials for conspiring in a Russian cyberwarfare operation known as Sandworm. ...
Read More
What Is a Zombie Computer?
With the month of October comes the spookiest of holidays: Halloween. And in the world of technology, few things are quite as frightening as zombie ...
Read More
What Happens When You Download an Email Attachment?
When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that ...
Read More

Goodbye, Internet Explorer. Hello, Microsoft Edge.

Sep 8, 2020

Since its launch in 1995, Microsoft has struggled to convince people to adopt Internet Explorer. So much so that the browser has even found itself to be the joke of many popular online memes.

But as Microsoft slowly begins to end support for Internet Explorer on November 30, 2020 so it can focus on Edge, how does its newest browser stack up amongst the competition?

Read More

Essential Password Security | Part One

Aug 27, 2020

While simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.

Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.

Read More

New Malware Hits Recovering Small Businesses

Aug 19, 2020

As the US recovers from a second spike in COVID-19 cases, the FBI warns that our current reliance on technology has resulted in a “breathtaking” number of new online scams.

But of those threats, one newly updated virus jeopardizes the livelihood of small businesses that are slowly reopening after the wake of an economic fallout.

Read More
Application Whitelisting

What Is Application Whitelisting?

Aug 10, 2020

Although our newfound reliance on remote working has caused a surge in cybersecurity threats, what if we told you that some of the most common attacks are the easiest to prevent?

In this video, Rocket IT provides you with a quick run-down of how application whitelisting can be used to stop malicious attacks dead in their tracks; before they have an opportunity to spread throughout your business network.

Read More

Virtual Activities for the Fourth of July

Jul 2, 2020

The first half of 2020 has been a little different from years past. Events, celebrations, and social gatherings have been canceled; placing a strain on those looking for things to do throughout the early months of summer. And now, as the Fourth of July quickly approaches, citizens across Gwinnett County, Georgia, and the entire United States are scrambling to find some fun and safe ways to celebrate Independence Day.  

At Rocket IT, two of our core values are to find a better way and have a blast, and this Fourth of July, we’re giving readers an inside look on some virtual activities to keep the good times afoot.  

Read More

COVID-19 Exposure Logging | Are Apple & Google Tracking Your Health?

Jun 25, 2020

Over the last few days, you may have heard news of Apple and Google pushing a new feature across iPhone and Android devices with the intent to better track the spread of COVID-19. But what does this feature really do and is your privacy at risk?

Read More

The Anatomy of a Hack – Ep. 15 Rocket IT Business Podcast

Jun 15, 2020

Last year, around 1,500 major business data breaches and countless smaller ones occurred in the U.S. alone. Interested in learning what caused a majority of these attacks? In this episode of the Rocket IT Business Podcast, our in-house cybersecurity expert provides audiences with the inside scoop on a slew of new and unusual threats hacking groups are using to infiltrate business networks.

Read More

2020 Father’s Day Gift Guide | Tech for Every Interest

Jun 10, 2020

While Father’s Day is a time to celebrate the individuals that helped guide us through the difficulties of adolescence, it’s no reason to give them a gift that’s stuck in the past.

With new tech hitting the market every week, it’s time to stop gifting ill-patterned ties and get dad something he’ll really like this year. Not sure where to start? Rocket IT’s 2020 tech gift guide has something for even the most niche of interests.

Read More

What It Takes to Stop a Hack

Jun 4, 2020

As the technology behind successful business operations continues to advance, hacking groups trail close behind with a slew of new and unusual threats. But what’s preventing these groups from wreaking havoc on any and every organization at their mercy?

On Thursday, June 11th, Rocket IT’s VP of Technology, Eric Henderson will host a webinar with Partnership Gwinnett in which audiences will witness first-hand the dissection of a real-world attack that hit a Metro Atlanta-based company.

Read More

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.