Rocket IT and Eagle Ranch Team Up for Annual “Run the Ranch 5k”
On June 1, 2019, it’s time to lace up, hit the trails, and make a difference in the lives of local children and their families. In tandem with Eagle Ranch, Rocket IT’s sponsorship of the Run the Ranch 5k affords participants the opportunity to get involved with one of the nations leading nonprofit residential children’s programs.
Read MorePassword Security: Part Three – Two-Factor Authentication
Over the past few weeks, we’ve covered everything from password complexity to the management that sustains it. Now, we’re ready to make the leap into a slightly more complex layer of password security, two-factor authentication. In this final installment, we’ll wrap things up by highlighting the benefits of implementing one of these services, while helping you decide which method may be right for you.
Read MoreRocket IT Promotes Leadership Team to Support Organization’s Growth
Since the genesis of a Leadership Team at Rocket IT in 2012, the organization has experienced a steady upward trend in client and team growth. Faced with this surge of success, and the challenges that come with it, certain members of Rocket IT’s Leadership Team have continued to demonstrate the qualities associated with an executive-level team member.
Read MorePassword Security: Part Two – Managing Multiple Passwords
If you read the first part of our password security series, you understand the significant impact that passphrases can have on account security. This week, we’re focusing our attention on the importance of using multiple unique passphrases, while giving you some handy methods to keep track of all your new login credentials.
With just a couple of (free) changes, you can add an additional layer of security to all of your online accounts.
Read MorePassword Security: Part One – Implementing a Passphrase Standard
While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.
Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.
Read MoreThe Threat of Phishing is Real – Proact With A Rocket IT System Test!
What Is Phishing (In Layman’s Terms)? By now, you’ve heard how major international organizations, local businesses and cities, and even your business associates have been hit by downtime, exorbitant costs, and data due to advanced phishing techniques. At Rocket IT, it is a goal to cast a brighter light on phishing, and the negative impact…
Read MoreSecurity Testing and Training: What a Strong System Looks Like
Just as new employee training is an ongoing process, so is security testing and training for all members of your organization and your systems. It seems new threats are being discovered every day, so it’s important for your team to know what these threats look like and how to react, as well as to plan…
Read MoreRocket IT’s Gwinnett Chamber Awards & Nominations From 2015 To Today
Matt Hyatt Honored at the Gwinnett Chamber’s 2020 Annual Dinner Rocket IT has been a long-time member of the Gwinnett Chamber of Commerce including membership in the Chairman’s Club since 2007. Since 2015, our company and different members of the staff have been honored and awarded across a variety of categories. Explore these notable milestones…
Read More