Cybersecurity Series | Part 3
Email Security: How to Avoid Phishing and Block Scammers
Given the amount of emails sent and received in any given day at a company, it’s important to focus cybersecurity efforts on email security. Emails can be a dangerous loophole for phishing attacks if not managed properly within your business.
Cybersecurity Series | Part 3
Cybersecurity Series | Part 2
Why Passwords Matter
Not all passwords are created equal. And that’s not just because you literally create your own individual password. It’s important to be informed when creating passwords for classified information because passwords really are not created equal when it comes to cybersecurity.
Cybersecurity Series | Part 1
Simple Employee Precautions for Your Small Business
Educating employees about cybersecurity can start small and simple. Small efforts consistently across all employees can significantly strengthen cybersecurity risk for your small business.
Disclaimer: We’re an IT firm. We recommend that you evaluate the data and choose a path that best serves your business’s needs. This advice is intended for business with 10+ employees.
We’ve had prospects and clients ask us if they should buy their computers from retailers such as BestBuy, Dell.
When your computer life has come to an end, proper destruction of your hard drive is vital to the security of your business.
When disposing of an old PC, it’s important to consider the importance of the information still on the hard drive when you determine how (or whom) will be completing the destruction of your drive.
E-waste is a growing problem in the United States and beyond. We’re talking discarded computers, televisions, printers, cell phones, smoke alarms, microwaves, and other miscellaneous electronic equipment. Up until last September, China accepted 70% of the world’s electronic waste- when they stopped doing so, many countries like the United States were faced with the reality of the growing e-waste problem and what to do about it.
It’s a universal truth that everyone is afraid of their business being hacked. But add to that list of fears the costs of being hacked as well. Ever thought about that? A cyber attack on your business can be very costly. Here, we’re breaking down four main areas of expense when an attack takes place.
When vetting an in-house “IT Guy” or outsourced IT Company, there are several traits you should seek out in order to find the right IT solution for your business.
Top 4 Traits of Irreplaceable IT Consultants
Forward-thinking Mindset--part of what you’re paying your IT consultant for (in a perfect world) is their constantly evolving and growing knowledge of the industry.
PK Tech and the Arizona Humane Society (AHS) have a special connection through a shared vision that every pet deserves a good life. Mary Hetrick, wife of PK Tech owner Jordan Hetrick, works for AHS as their Events & Partnerships Specialist.
PK Tech recently started a program where referrals to local businesses will generate a $100 donation to AHS. But we’re always looking to do more.
To outsource or not to outsource. This is the struggle of small businesses everywhere.
When it comes to IT, it’s obvious that we’re big proponents of outsourcing. We spend our days (and some of our nights too) focused on being the best in the industry at what we do.