Blog

Acquiring a Competitor During COVID-19? Assess Cybersecurity Early!

When two companies merge, the existing security risks multiply. In the climate of the COVID-19 global pandemic, it's more important than ever to assess cybersecurity early in the process of integration and merging of two separate companies. 

Merging two companies' technology has always been a challenging and intricate integration, but in the face of the additional cybersecurity challenges related to COVID-19, it's proven more challenging than ever.

Hacker Tracker | October in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware--without being afraid--of the cybersecurity threats that are real threats for your business.

5 Corners Your IT Guy is Probably Cutting

We’re not asking if your IT guy is “really nice” or “funny” or “pleasant to have in the office.” We’re asking: do they properly support your business? Do they get the job DONE? 

We’re on a mission to do a fantastic job for our clients and help prospective clients recognize when they’re not getting the IT support they need (and deserve). 

Enter.

What is Cybersquatting and Why Should You Care?

First of all, what is Cybersquatting?

With the intent of profiting from user mistakes, cybercriminals take advantage of the essential role that domain names play on the internet by registering names that appear related to existing domains or brands. Cybersquatting in action will see attackers mimicking domains of major brands like Facebook, Amazon, Netflix, or Apple to scam consumers.

Cybersecurity Hubris During the Work From Home Era

Ever since work-from-home (WFH) skyrocketed in March following COVID-19 pandemic lock-downs, corporate cybersecurity has taken a front seat in the growing conversation among IT leaders in businesses and organizations.

In June, Malwarebytes surveyed over 200 IT experts from companies of various sizes to determine how IT leaders had initially reacted to the pandemic and how they were planning their strategies moving forward.

Cybersecurity Survey Reveals that Organizations Previously Hit by Ransomware Are Forever Changed

A new global survey titled "Cybersecurity: The Human Challenge" (reference) essentially found that organizations are never the same after they've experienced a ransomware attack. In line with these findings, the survey also found that how IT managers anticipate and handle future cyberattacks also changed significantly based on whether the organization had previously experienced a ransomware attack.

The Most Vulnerable Departments and Sectors to Phishing Attacks: Is Yours on the List?

With all this talk of increased cybersecurity measures and vulnerability to phishing attacks, you may be wondering: what are the most vulnerable departments and sectors to phishing attacks? 

The entire motivation behind cyber attackers is to identify and pursue system vulnerabilities and illegally access sensitive data--whenever and wherever they can get their hands on it.