The Importance of Regular IT Audits: Ensuring Compliance and Security
In 2021, a popular information technology (IT) management platform was breached, leaving almost 30 percent of organizations compromised and millions of individuals feeling the ripple ...
Read More
How to Implement a Successful Disaster Recovery Plan for Your Business
Disaster often strikes when it’s least suspected. You may not think your small business needs to be prepared for disruption, but almost two-thirds of businesses ...
Read More
Outlook Easter Eggs: Discovering Microsoft’s Hidden Features
While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within software applications or ...
Read More
CD Projekt Red Breached | How to Protect Your Data
In 2020, one in four cyberattacks were the result of ransomware: a network  hijack capable of locking business out of crucial data for weeks on ...
Read More
Parler Returns to App Store | Previous Breach Leading to Parler’s Demise
Social Media platform, Parler found itself in hot water after its services were used to assist in the planning of the attack on the United ...
Read More
Thrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
https://youtu.be/C5iJ3Z-TIjk With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats ...
Read More

Password Security: Part One – Implementing a Passphrase Standard

Feb 15, 2019

While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.

Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.

The Threat of Phishing is Real – Proact With A Rocket IT System Test!

Jan 30, 2019

What Is Phishing (In Layman’s Terms)? By now, you’ve heard how major international organizations, local businesses and cities, and even your business associates have been hit by downtime, exorbitant costs, and data due to advanced phishing techniques. At Rocket IT, it is a goal to cast a brighter light on phishing, and the negative impact…

Security Testing and Training: What a Strong System Looks Like

Oct 24, 2018

Just as new employee training is an ongoing process, so is security testing and training for all members of your organization and your systems. It seems new threats are being discovered every day, so it’s important for your team to know what these threats look like and how to react, as well as to plan…

Onboarding Plan: 90 Days to a Successful New Employee

Sep 6, 2018

If you’re not hiring and training new team members on a very regular basis, it’s easy to forget all the elements that go into this extensive and ongoing process. The standard probation or onboarding period for new hires is 90 days for a reason. Without documenting the elements of training, you’re likely to have to…

Why Every Person In A Company Shares Responsibility For Keeping The Network Safe

Jul 6, 2018

No matter your industry or company size, each person in your organization plays an important role and needs to understand that from the moment they join your team. This is especially true when it comes to the security of your organization and the data you are trusted with. While security may not be someone’s primary…

Why New Employee Training is Actually an Ongoing Process

Jun 22, 2018

New employee training is a key component of your onboarding process. When new hire training is carefully planned, it will set your team members up for success and transition them into their new role as smoothly as possible. However, it’s important to remember that new team members are processing a lot of information in the…

Maintaining a Safe Workplace

Jun 18, 2018

Maintaining the security of your organization’s data doesn’t stop with the firewall, antivirus software, or employee training. In order to adequately protect all the sensitive information your organization keeps on file, you also need to consider how you maintain the physical safety of your workplace. Maintaining a safe workplace might seem like a no-brainer, but…

IT Policies to Cover When Onboarding New Employees

Jun 1, 2018

Onboarding a new employee isn’t as simple as it sounds. In addition to making sure you provide the proper training for the job this team member will perform, it’s also important to make sure he or she is given thorough training in other aspects of your organization and operations. Over the next few months, we’ll…

Your Comprehensive Business Guide To BYOD (Bring Your Own Device) At Your

May 31, 2018

In recent years, Bring Your Own Device (BYOD) policies have become more common in many offices in all industries. From saving your company money to security management, there’s a lot to consider when you are contemplating whether to allow employees to use their own devices to complete their work. On the surface, it appears to be…

Have You Changed Your Password Yet?

Feb 14, 2018

If you haven’t changed your password since 2016, then you could be in for trouble. With the amount of breaches surmounting every day, using the same old password could compromise your information… Especially if you use a weak password or reuse the same one between accounts. In December, SplashData released their annual list of the…

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.