Hacker Tracker | March in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware--without being afraid--of the cybersecurity threats that are real threats for your business.

Out-of-Date Applications Rank as a Top Vulnerability–Do You Still Have Flash Installed?

When it comes to out-of-date applications, please don't ignore them. While Adobe's Flash Player officially hit its end of life on January 1, 2021. Businesses all over the world still have Adobe Flash installed, making the risk greater than ever. While the life of Flash may have ended, it lives on in hundreds of thousands to millions of computers, creating lasting vulnerabilities to organizations.

3 Quick IT Best Practices for Law Firms

It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as -- infrastructure, security, software, and support. Many firms outsource their IT department to IT Companies in hopes that they can guide them into the right decisions for these big 4 categories.

59% of Buyers are Likely to Avoid Companies that Suffered from a Cyberattack in the Past Year

In the ever-changing and competitive marketplace (Thank you global pandemic!), gaining and maintaining buyers for your products or services is more challenging than ever. We could give hundreds of reasons why investing in cybersecurity is important, but here’s one that might catch your attention more than others: 59% of buyers are likely to avoid companies that suffered a cyberattack in the past year, according to Arcserve Data Attack Surface Report.

10 Steps to Proper Employee Offboarding for IT Security

We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.

Offboarding, on the other hand, has a significant risk to the business if done improperly. Failure to completely outboard could allow former employees to maintain access to secure networks, confidential information, and sensitive company data.

IRS Publication 4557 – Safeguarding Taxpayer Data

CPA firms are lucrative targets for hackers. They store, send, and receive Personally Identifiable Information (PII) for a living. Because CPA firms are especially targeted, the IRS recently released Publication 4557, which  explains the legal requirements tax preparers are subject to and further offers guidance on maintaining compliance (Source). 
What is it about CPA firms that makes them so enticing for hackers looking for an easy victim? 
Financial data.