Case Story | Financial Spear Phishing

In 2020, phishing scams involving payment and invoice fraud increased by 112%. But as the social engineering behind these attacks becomes more complex, here’s how one business refused to become a part of the statistic and trained its finance department to become a team of cybersecurity experts.

Read More

Pros & Cons of an On-Premise Server

While on-premise servers and cloud platforms both offer the ability to access files remotely, selecting one that properly balances your business’s budget, scalability, and security needs can be a difficult process.

In part one of this video series, Rocket IT will begin to help you navigate the pros and cons of each option, and provide you with the information needed to make a sound choice for your remote file enablement needs.

Read More

Case Story | Enhanced Security – Manufacturing

Training employees on the tell-tale signs of a phishing email takes time.

And although many businesses rely on traditional antivirus, firewalls, and spam filters to circumvent the vulnerabilities presented by such threats, one Rocket IT client quickly learned those measures alone are no match for an era of modern attacks.

Read More

United States Charges Russian Hackers

Recently, the United States Department of Justice charged six Russian military officials for conspiring in a Russian cyberwarfare operation known as Sandworm.

Now, those allegations have reached the public eye and Russia is being held responsible for sabotaging national economies, interrupting government elections, covering up weapon testing, and more.

Read More

What Happens When You Download an Email Attachment?

When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?

If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?

Read More