Security
Essential Password Security | Part Three | Video Series
So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.
Now it’s time to learn how to create, store, and access all the rest of your passwords.
Read MoreEssential Password Security | Part Two
In the last video, we left you with a long list of requirements to keep yourself secure.
Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.
Read MoreEssential Password Security | Part One | Video Series
While simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.
Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.
Read MoreNew Malware — Agent Tesla Hits — Recovering Small Businesses
As the US recovers from a second spike in COVID-19 cases, the FBI warns that our current reliance on technology has resulted in a “breathtaking” number of new online scams.
But of those threats, one newly updated virus jeopardizes the livelihood of small businesses that are slowly reopening after the wake of an economic fallout.
Read MoreApplication Whitelisting and How Your Business Can Benefit From Using It
Although our newfound reliance on remote working has caused a surge in cybersecurity threats, what if we told you that some of the most common attacks are the easiest to prevent?
In this video, Rocket IT provides you with a quick run-down of how application whitelisting can be used to stop malicious attacks dead in their tracks; before they have an opportunity to spread throughout your business network.
Read MoreThe 2020 Twitter Bitcoin Scam & the Future of Social Engineering
Elon Musk, Bill Gates, Apple, Uber, Jeff Bezos, Barack Obama, and Kanye West: what do they all have in common? Aside from being notable businesses and individuals to audiences across the globe, each of these entities fell victim to a cyber attack that hit Twitter on July 15, 2020.
On that day, Tweets from the aforementioned accounts and 38 other verified users were posted, offering millions of followers what appeared to be the investment of a lifetime.
Read MoreCOVID-19 Exposure Logging | Are Apple & Google Tracking Your Health?
Over the last few days, you may have heard news of Apple and Google pushing a new feature across iPhone and Android devices with the intent to better track the spread of COVID-19. But what does this feature really do and is your privacy at risk?
Read MoreRansomware Targeting Remote Small Business Workers
While making the shift to remote work in response to COVID-19, the global software development firm known as Sapiens International was hit with a cybersecurity breach; resulting in $250,000 in lost revenue.
Although the organization has yet to officially report the situation to American exchange authorities, this event should stand as a precautionary warning to businesses with lax security policies for remote workers.
Read MoreRocket IT Business Podcast | Eric Henderson | The Anatomy of a Hack | Ep 15
Last year, around 1,500 major business data breaches and countless smaller ones occurred in the U.S. alone. Interested in learning what caused a majority of these attacks? In this episode of the Rocket IT Business Podcast, our in-house cybersecurity expert provides audiences with the inside scoop on a slew of new and unusual threats hacking groups are using to infiltrate business networks.
Read More