The Remote Work Trend is Here to Stay. Is Your Business Prepared?

We’re over a year into the COVID-19 global pandemic, and the million-dollar question remains: is remote work here to stay? It’s a great question and something all companies are likely considering.  According to TechRepublic’s CIO Jury, 100% of employers will continue to offer remote work after the pandemic, proving that working from anywhere is a […]

To Keep Your Network Secure, Use Multi-factor Authentication 100% of the Time

Curious how most cyber-criminal hackers gain access to enterprise networks? It’s simple: they steal or guess usernames and passwords.  To keep your network secure, you should require all people that access your network to use multi-factor authentication all the time. Why? Because the majority of cyberattacks happen because a password was compromised one way or […]

What We Can Learn from the City of Kingman’s Criminal Cyberattack

A massive cyberattack targeted the Arizona City of Kingman’s technology infrastructure in early March. While categorized by officials as a “criminal cyberattack”, it was noted that the city did not lose complete control of their network. Here’s What We Know About the Attack The attack caused a string of affects, including requiring many resident services […]

Over 90% of Malware Is Polymorphic — Is Your Business Protected?

Cybersecurity statistics can be terrifying, but that doesn’t mean you should turn your head the other way. We can learn a lot from cybersecurity statistics and further, they can inform the way we think about preventative cybersecurity for the future. A 2020 Webroot Threat Report looked into malware and how sophisticated it has become in […]

FYI Microsoft’s “Shared Responsibility Model” for Office 365 Means YOU Are Responsible Backups, NOT Microsoft!

Are you under the impression that Microsoft is responsible for the backups inside of solutions like Office 365, Exchange Online, OneDrive and SharePoint Online? Think again. It’s a common question–really an assumption–that many of our clients make and we’re always quick to correct. It’s important to understand that under Microsoft’s “Shared Responsibility Model” for Office […]

Beware: Your Text Messages Could Be Rerouted to Hackers for as Little as $16

A nasty new attack has recently come to light thanks to Motherboard/Vice: attackers silently redirecting your text messages so they can compromise your two-factor accounts that rely on text messaging.  The attacks use a legitimate text messaging management service designed to help businesses with marketing and mass messaging people. However, attackers are using this service […]

Hacker Tracker | March in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware–without being afraid–of the cybersecurity threats that are real threats for your business. PK […]

3 Quick IT Best Practices for Law Firms

It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as — infrastructure, security, software, and support. Many firms outsource their IT department to IT Companies in hopes that they can guide them into the right decisions for these […]