Password Security: Part One – Implementing a Passphrase Standard
While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee ...
Read More
The Threat of Phishing is Real – Proact With A Rocket IT System Test!
What Is Phishing (In Layman’s Terms)? By now, you’ve heard how major international organizations, local businesses and cities, and even your business associates have been ...
Read More
Security Testing and Training: What a Strong System Looks Like
Just as new employee training is an ongoing process, so is security testing and training for all members of your organization and your systems. It ...
Read More
Onboarding Plan: 90 Days to a Successful New Employee
If you’re not hiring and training new team members on a very regular basis, it’s easy to forget all the elements that go into this ...
Read More
Why Every Person In A Company Shares Responsibility For Keeping The Network Safe
No matter your industry or company size, each person in your organization plays an important role and needs to understand that from the moment they ...
Read More
Why New Employee Training is Actually an Ongoing Process
New employee training is a key component of your onboarding process. When new hire training is carefully planned, it will set your team members up ...
Read More

The Importance of Regular IT Audits: Ensuring Compliance and Security

Sep 21, 2023

When a well-known business experiences a cyberattack, it can leave you questioning the security of your own organization. Here’s how a simple IT audit can give you a clear path to protect your data and team.

How to Implement a Successful Disaster Recovery Plan for Your Business

Sep 20, 2023

When disaster strikes, two-thirds of small businesses never recover. Here are some tips you can implement right now to secure your IT infrastructure and rest easy.

Technology Resolutions to Consider for the New Year

Jan 24, 2022

One in four people start the year with a set of hopeful resolutions. For those individuals with a goal to improve the health of their organizations, here’s how technology can help you put your best foot forward in 2022.

Outlook Easter Eggs: Discovering Microsoft’s Hidden Features

Apr 2, 2021

While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within some of our favorite software applications.

And although developers may make it difficult to find some features, Rocket IT has discovered six key features concealed in Microsoft Outlook to maximize your productivity.

What is MyAnalytics? | Microsoft’s Work-Life Balance Solution

Mar 5, 2021

As many individuals continue to work from home, the fine line that once defined a proper work-life balance has blurred and the risk of burnout is all too real for many people.

Understanding this threat, Microsoft’s newest update to its MyAnalytics product provides hard-working team members with more tools to reclaim control of their schedules.

CD Projekt Red Breached | How to Protect Your Data

Feb 16, 2021

On February 9, 2021, one of today’s most popular video game developers awoke to locked network files and a ransom note.

Here’s how you can learn from their failure and protect your data.

Thrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8

Oct 21, 2020

With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats that you may unknowingly come in contact with on a daily basis.

In this episode of Thrive Y’all, we sit down with two of Rocket IT’s in-house security experts, Eric Henderson and Patrick Richardt.

What Happens When You Download an Email Attachment?

Oct 13, 2020

When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?

If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?

Essential Password Security | Part Three | Video Series

Sep 29, 2020

So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.

Now it’s time to learn how to create, store, and access all the rest of your passwords.

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.