Security
Case Story | Financial Spear Phishing
In 2020, phishing scams involving payment and invoice fraud increased by 112%. But as the social engineering behind these attacks becomes more complex, here’s how one business refused to become a part of the statistic and trained its finance department to become a team of cybersecurity experts.
Read MorePros & Cons of an On-Premise Server
While on-premise servers and cloud platforms both offer the ability to access files remotely, selecting one that properly balances your business’s budget, scalability, and security needs can be a difficult process.
In part one of this video series, Rocket IT will begin to help you navigate the pros and cons of each option, and provide you with the information needed to make a sound choice for your remote file enablement needs.
Read MoreNew COVID-19 Vaccine Scam
As infection rates continue to climb in the weeks preceding the holidays, those interested in the COVID-19 vaccine are left wondering when it’ll be openly available for all to receive.
But as vaccine manufacturers do their best to meet this nation-wide demand, cybercriminals have quickly begun to capitalize on the public’s desperation and confusion.
Read MoreThe Biggest Hack of the Decade | SolarWinds Breach
On December 18, the Cybersecurity and Infrastructure Security Agency notified the public of a wide-spread hack that is believed to have compromised government agencies, critical infrastructures, and private sector organizations across the United States.
Read MoreCase Story | Enhanced Security – Manufacturing
Training employees on the tell-tale signs of a phishing email takes time.
And although many businesses rely on traditional antivirus, firewalls, and spam filters to circumvent the vulnerabilities presented by such threats, one Rocket IT client quickly learned those measures alone are no match for an era of modern attacks.
Read MoreThrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8
With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats that you may unknowingly come in contact with on a daily basis.
In this episode of Thrive Y’all, we sit down with two of Rocket IT’s in-house security experts, Eric Henderson and Patrick Richardt.
Read MoreUnited States Charges Russian Hackers
Recently, the United States Department of Justice charged six Russian military officials for conspiring in a Russian cyberwarfare operation known as Sandworm.
Now, those allegations have reached the public eye and Russia is being held responsible for sabotaging national economies, interrupting government elections, covering up weapon testing, and more.
Read MoreWhat Are Zombie Computers & How Do They Create A Zombie Network?
Do you sometimes think your computer has a mind of its own? As it turns out, it just might!
With Halloween right around the corner, here’s a spooky tale of zombie viruses, and how hackers are using this form of malware to take complete control of technologies and their resources.
Read MoreWhat Happens When You Download an Email Attachment?
When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?
If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?
Read More