What Is Spear Phishing? | Definition & Prevention

February 17, 2023

While the modern cybercriminal has access to numerous tools, spear phishing continues to be the weapon of choice as attacks have increased by 127% in the last year. Fortunately, there are some easy steps you can take to protect your team.

Read More

Facebook’s Hidden Tool to Delete Your Phone Number and Email | Sync Up

November 14, 2022

Even if you didn’t provide the information yourself, Facebook probably has your phone number or email address. Here’s a new tool to help you remove those personal details from the social media platform.

Read More

Chipotle Marketing Hacked to Send Phishing Emails | Sync Up With Rocket IT

August 4, 2021

Hailed by many fast-food connoisseurs as the best place for a to-go burrito, beloved restaurant chain Chipotle is making headlines as cybercriminals recently hacked the organization’s email marketing account and used it to send customers phishing emails.

Read More

Facebook Data Breach | How to Know if Your Facebook Was Hacked

April 19, 2021

On April 3, 2021, the phone numbers, email address, dates of birth, and locations of more than 530 million Facebook users was published to a well-known hacking forum.

While the vulnerability that caused the leak appears to be fixed, if you created a Facebook account before 2020, you’ll need to update your profile’s security settings.

Read More
Microsoft Outlook Easter Eggs Hidden Features

Outlook Easter Eggs: Discovering Microsoft’s Hidden Features

April 2, 2021

While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within some of our favorite software applications.

And although developers may make it difficult to find some features, Rocket IT has discovered six key features concealed in Microsoft Outlook to maximize your productivity.

Read More

What Happens When You Download an Email Attachment?

October 13, 2020

When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?

If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?

Read More

Avoiding Tax Season Phishing Scams

February 27, 2020

With tax season now in full swing, cyber criminals have once again boosted their fraudulent activities; hoping to scam unsuspecting individuals out of well-earned refunds and possibly even their own identities.

But despite the many complex tools scammers can use to gain access to sensitive account information, the sense of urgency around filing taxes creates a breeding ground for successful phishing attacks.

Read More

Cybersecurity Speaker Series: Featuring Rocket IT VP of Technology

October 10, 2019

With hacking groups now acquiring significant funds to support their illegal activities, what were once standard cybersecurity practices have become obsolete in recent years.

In an effort to spread awareness about current digital threats and the new measures needed to protect against them, on November 1st, Rocket IT Vice President of Technology, Eric Henderson, will provide Southwest Gwinnett Chamber members with a timeline of security innovation. 

Read More
What Is Spear Phishing? | Definition & Prevention
The modern cybercriminal’s toolbelt has grown quite a bit in recent years. But despite all the new technology these hackers have access to, it’s the ...
Read More
Facebook’s Hidden Tool to Delete Your Phone Number and Email | Sync Up
https://youtu.be/AiDwAJ6GYPs Even if you didn’t provide the information yourself, Facebook probably has your phone number or email address. Fortunately, a new tool from Meta is ...
Read More
Chipotle Marketing Hacked to Send Phishing Emails | Sync Up With Rocket IT
https://youtu.be/10-stX1EeaE Hailed by many fast-food connoisseurs as the best place for a to-go burrito, beloved restaurant chain Chipotle is making headlines as cybercriminals recently hacked ...
Read More
Facebook Data Breach | How to Know if Your Facebook Was Hacked
Similar to the Instagram data breach we reported here, Facebook, the most popular social networking platform in the world, is in hot water for its lax policies on data management and the privacy ...
Read More
Outlook Easter Eggs: Discovering Microsoft’s Hidden Features
While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within software applications or ...
Read More
What Happens When You Download an Email Attachment?
When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that ...
Read More