FBI Warns of Massive Wave of Road Toll SMS Phishing Attacks | Sync Up
https://youtu.be/d_MXIdcZG0M For commuters, paying road tolls is part of the routine. And because many people might not think too much about paying those fees, scammers ...
Read More
Google Agrees to Delete Incognito Mode Data to Settle Lawsuit | Sync Up
https://youtu.be/5pEayQ6PJCA Does Google Chrome’s Incognito Mode really offer private web browsing? While the answer to that question is a resounding no, we’ll cover the verdict ...
Read More
AT&T Data Breach Leaks Millions of Customer Records Again | Sync Up
https://youtu.be/yWxHh_q_ssA With AT&T announcing a massive data breach, millions of customers are once again left worrying if their information was exposed. We’ll cover the extent ...
Read More
US Sues Apple Over Smartphone Monopoly in Antitrust Case | Sync Up
https://youtu.be/GKqRMW12Pbc The U.S. Department of Justice is suing Apple, claiming the tech giant has monopolized the smartphone market. We’ll cover key points from the DOJ’s ...
Read More
Faster Broadband Internet is Coming | FCC Quadruples the Benchmark | Sync Up
https://youtu.be/oRwksR1Ta58 The definition of broadband internet is changing as the FCC has recently decided to increase the minimum internet speed of US homes and businesses ...
Read More
The Mother of All Breaches Reveals 26 Billion Records | Sync Up
https://youtu.be/UB2RnLZfwCA Recently, the ‘Mother of All Breaches' exposed 26 billion records from some of the biggest names in technology and social media. We’ll explore what ...
Read More

Password Security: Part One – Implementing a Passphrase Standard

Feb 15, 2019

While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.

Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.

Read More

The Threat of Phishing is Real – Proact With A Rocket IT System Test!

Jan 30, 2019

What Is Phishing (In Layman’s Terms)? By now, you’ve heard how major international organizations, local businesses and cities, and even your business associates have been hit by downtime, exorbitant costs, and data due to advanced phishing techniques. At Rocket IT, it is a goal to cast a brighter light on phishing, and the negative impact…

Read More
Woman at her desk smiling at the camera with a laptop

Your Comprehensive Business Guide To BYOD (Bring Your Own Device) At Your

May 31, 2018

In recent years, Bring Your Own Device (BYOD) policies have become more common in many offices in all industries. From saving your company money to security management, there’s a lot to consider when you are contemplating whether to allow employees to use their own devices to complete their work. On the surface, it appears to be…

Read More

Becoming Your Own Security Champion

Feb 28, 2018

In the age of ransomware, every position is now a security role. Every member of your team needs to be equipped to identify suspicious emails, know to be wary of unsolicited links, and be passionate stewards for the integrity of your network. Here’s how you can become your own security champion and how you can…

Read More

Have You Changed Your Password Yet?

Feb 14, 2018

If you haven’t changed your password since 2016, then you could be in for trouble. With the amount of breaches surmounting every day, using the same old password could compromise your information… Especially if you use a weak password or reuse the same one between accounts. In December, SplashData released their annual list of the…

Read More
team of people spread out over the office using computers

Preventing Identity Theft Through Your Devices

Feb 9, 2018

In a world rapidly filling with smart appliances, homes, and cars, staying connected and secure at the same time is becoming increasingly more difficult. The number of phishing campaigns and the latest breaches have made identity theft a top concern, especially after news of the Equifax breach, and smart homes are another opening for risk.…

Read More
Three Rocket IT team members pointing at and talking about a computer

Understanding Patch Tuesday And How It Keeps Your Network Updated & Secure

Feb 2, 2018

What Is Patch Tuesday? Windows users may be familiar with the term “Patch Tuesday.” This casual phrase is used to describe Microsoft’s regular release of security and other major patches for its software on the second (and occasionally fourth) Tuesday of every month. What does this mean for the average end user? To run updates,…

Read More
three team members in an office looking at a computer tablet

Questions You Need to Ask Before Selecting a New Software Solution

Jan 12, 2018

So, you’ve identified a need for a new software solution. Whether you’re replacing an old one or adding to your technology stack, finding the right one can be a lengthy and arduous process. You want to make the right choice the first time. To help guide you along the journey, here are the questions you…

Read More

What You Need to Know About Spectre and Meltdown

Jan 4, 2018

The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches. So, what exactly does this mean for you? Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are…

Read More

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.