The Mother of All Breaches Reveals 26 Billion Records | Sync Up
https://youtu.be/UB2RnLZfwCA Recently, the ‘Mother of All Breaches' exposed 26 billion records from some of the biggest names in technology and social media. We’ll explore what ...
Read More
Microsoft Starts Testing Wi-Fi 7 in Windows 11 With Insiders | Sync Up
https://youtu.be/2rzH46T45Zw With the recent launch of Wi-Fi 7, developers have quickly set their eyes on making hardware capable of supporting faster speeds. We’ll cover how ...
Read More
DuckDuckGo Adds a Sync & Backup Feature | Sync Up
https://youtu.be/x7NS9lWMHcE For DuckDuckGo users, it just got a whole lot easier to sync your browser settings across devices. We’ll show you how to enable the ...
Read More
AI-Generated Robocalls Made Illegal | Stop Unwanted Calls | Sync Up
https://youtu.be/fYjBdP2RP2A With the presidential election on the horizon, robocalls are on the rise. But, this year, AI could potentially make those calls even more difficult ...
Read More
Microsoft Teams Phishing Pushes New Malware Via Group Chats | Sync Up
https://youtu.be/BdrG0rPVRNU Although Microsoft Teams is great for keeping organizations connected and collaborative, new research shows it also provides hackers with a subtle way to slip ...
Read More
X/Twitter Adds Passkeys for Passwordless Login on iPhone App | Sync Up
https://youtu.be/7MxWTLUbdKQ Want to better secure your social media accounts? We’ll show you how to enable Face ID or Touch ID on your X account as ...
Read More

Case Story | Enhanced Security – Manufacturing

Dec 14, 2020

Training employees on the tell-tale signs of a phishing email takes time.

And although many businesses rely on traditional antivirus, firewalls, and spam filters to circumvent the vulnerabilities presented by such threats, one Rocket IT client quickly learned those measures alone are no match for an era of modern attacks.

Thrive Y’all | Melissa Meeker | An Ecosystem of Water Innovation | Ep 13

Nov 23, 2020

While creating a hub for innovation is not for the faint of heart, a dedicated team of pioneers at The Water Tower are looking to accomplish just that with their progressive Gwinnett County campus.

With a mission fueled by imagination and informed by research, CEO, Melissa Meeker is helping both public and private industry leaders reenvision the future of water-saving technology.

Black Friday Tech Deals

Nov 19, 2020

With so many Black Friday deals already available and more on the way, which technology should you consider purchasing, and what should you hold out on?

To help you decide, Rocket IT has prepared a 2020 Black Friday buying guide; highlighting the best offers on some of our team’s favorite pieces of technology.

Thrive Y’all | Eric Henderson & Patrick Richardt | Cybersecurity Awareness Month | Ep 8

Oct 21, 2020

With October being Cybersecurity Awareness Month, what a better time than now to take a look at some of the new and peculiar threats that you may unknowingly come in contact with on a daily basis.

In this episode of Thrive Y’all, we sit down with two of Rocket IT’s in-house security experts, Eric Henderson and Patrick Richardt.

United States Charges Russian Hackers

Oct 21, 2020

Recently, the United States Department of Justice charged six Russian military officials for conspiring in a Russian cyberwarfare operation known as Sandworm.

Now, those allegations have reached the public eye and Russia is being held responsible for sabotaging national economies, interrupting government elections, covering up weapon testing, and more.

What Are Zombie Computers & How Do They Create A Zombie Network?

Oct 14, 2020

Do you sometimes think your computer has a mind of its own? As it turns out, it just might!

With Halloween right around the corner, here’s a spooky tale of zombie viruses, and how hackers are using this form of malware to take complete control of technologies and their resources.

What Happens When You Download an Email Attachment?

Oct 13, 2020

When opening an email and clicking the attachment held inside, do you ever think about what goes on behind the scenes; before and after that file is clicked?

If you’ve left your inbox and device unsecured, it’s likely that you click, cross your fingers, and hope you can trust the source. But let’s say you’ve invested in cybersecurity. What happens next?

Essential Password Security | Part Three | Video Series

Sep 29, 2020

So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.

Now it’s time to learn how to create, store, and access all the rest of your passwords.

Essential Password Security | Part Two

Sep 15, 2020

In the last video, we left you with a long list of requirements to keep yourself secure.

Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.