The Importance of Regular IT Audits: Ensuring Compliance and Security
In 2021, a popular information technology (IT) management platform was breached, leaving almost 30 percent of organizations compromised and millions of individuals feeling the ripple ...
Read More
How to Implement a Successful Disaster Recovery Plan for Your Business
Disaster often strikes when it’s least suspected. You may not think your small business needs to be prepared for disruption, but almost two-thirds of businesses ...
Read More
Outlook Easter Eggs: Discovering Microsoft’s Hidden Features
While the words “Easter eggs” may spark images of brightly colored eggs, in technology, Easter eggs refer to hidden features tucked within software applications or ...
Read More
CD Projekt Red Breached | How to Protect Your Data
In 2020, one in four cyberattacks were the result of ransomware: a network  hijack capable of locking business out of crucial data for weeks on ...
Read More
Parler Returns to App Store | Previous Breach Leading to Parler’s Demise
Social Media platform, Parler found itself in hot water after its services were used to assist in the planning of the attack on the United ...
Read More
Thrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
https://youtu.be/C5iJ3Z-TIjk With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats ...
Read More

2017 In Review: Proactive

Dec 15, 2017

It’s been a record-breaking year in security with a barrage of ransomware and phishing attacks on the global level threatening organizations. While breaches hit the news networks, the phishing failures and the proactive heroes keeping organizations safe often go unnoticed. (Want to learn more about ransomware and how to keep your organization safe? Get our free Security…

Security in the Age of Ransomware On-Demand Webinar

Jul 20, 2017

Nearly 77% of small businesses think they’re safe from cyberattacks, yet more than 40% have already been victims. Where is this disconnect, and how can you protect your organization? In the new age of ransomware, security has to be a top priority for every level at your organization. Find out what you can do to…

Ten Productivity Hacks To Get More Done

Jul 14, 2017

With everything you can do from any of your devices, technology can sometimes be more of a distraction than a help. But there are several great tools and tricks to keep you on track with your tasks. From waking up early and engaging in regular exercise to attempting to manage all of your social media…

Living Company Values – An Employee’s Perspective

Apr 14, 2017

Company culture is a hot topic right now. It’s headlining industry magazines, touting its name on awards, and (for those of you active on social media) it’s all over LinkedIn newsfeeds. At Rocket IT, it’s something our team is very intentional about. As someone who interacts on our organization’s behalf out in the community in…

Five Easy Steps to Capture Dead Time

Apr 7, 2017

The average cost of unplanned downtime per minute in 2016 was nearly $9,000 per incident. Your organization doesn’t have to eat the cost of dead time. Download our free whitepaper now to learn five easy steps you can take to capture dead time. From more efficient integration to beating your inbox addiction, this paper gives you…

How to Prepare for Working Outside the Country for the First Time

Mar 10, 2017

Are you getting ready to travel outside the country? You’ve probably run down the typical checklist: give your itinerary to a trusted friend or family member so someone knows where you are, check-in with your embassy, get your passport and (if necessary) visas up to date, stay hydrated, etc. But how can you make sure…

Creating Quiet Space for Employees in an Open Office

Feb 10, 2017

Like many offices today, Rocket IT’s headquarters has an open floor plan. This is fantastic for collaboration, accessibility to leadership, and anyone who suffers from FOMO (Fear Of Missing Out), but it can create a deficiency in quiet spaces to work. We posted previously about ways employees can focus in and block out distractions in…

BCC: How To Send Emails to Large Groups Without Giving Away Your Address Book

Jan 20, 2017

Have you ever received an email and winced when you saw the email addresses of about 25 other executives in the recipient line? For those of you who have been the ones sending those emails, sending one mass email to everyone instead of many individual ones is certainly the fastest and most efficient way to…

Protecting Yourself from Phishing Attacks

Dec 22, 2016

We’ve recently seen a good number of VERY sophisticated phishing emails that could’ve resulted in significant financial loss. As phishing attempts escalate, and scammers find increasingly crafty ways to elicit money from their victims, we must stay vigilant. One clever phishing email scheme we’ve seen increasing recently goes something like this: An employee receives an…

Upsurge in Phishing Activities: Don’t Take the Bait!

Dec 16, 2016

We’ve recently seen an increase in sophisticated phishing e-mails that could have resulted in significant financial loss. To help you detect the attempt before taking the bait, we’ve pulled a great article from our archives and updated it for your benefit. The Internet is full of friendly people. There are Nigerian princes who want to give…

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.