The Mother of All Breaches Reveals 26 Billion Records | Sync Up
https://youtu.be/UB2RnLZfwCA Recently, the ‘Mother of All Breaches' exposed 26 billion records from some of the biggest names in technology and social media. We’ll explore what ...
Read More
Microsoft Starts Testing Wi-Fi 7 in Windows 11 With Insiders | Sync Up
https://youtu.be/2rzH46T45Zw With the recent launch of Wi-Fi 7, developers have quickly set their eyes on making hardware capable of supporting faster speeds. We’ll cover how ...
Read More
DuckDuckGo Adds a Sync & Backup Feature | Sync Up
https://youtu.be/x7NS9lWMHcE For DuckDuckGo users, it just got a whole lot easier to sync your browser settings across devices. We’ll show you how to enable the ...
Read More
AI-Generated Robocalls Made Illegal | Stop Unwanted Calls | Sync Up
https://youtu.be/fYjBdP2RP2A With the presidential election on the horizon, robocalls are on the rise. But, this year, AI could potentially make those calls even more difficult ...
Read More
Microsoft Teams Phishing Pushes New Malware Via Group Chats | Sync Up
https://youtu.be/BdrG0rPVRNU Although Microsoft Teams is great for keeping organizations connected and collaborative, new research shows it also provides hackers with a subtle way to slip ...
Read More
X/Twitter Adds Passkeys for Passwordless Login on iPhone App | Sync Up
https://youtu.be/7MxWTLUbdKQ Want to better secure your social media accounts? We’ll show you how to enable Face ID or Touch ID on your X account as ...
Read More

The Role of Social Engineering in Cyberattacks — And How To Fight Back

Oct 13, 2017

Almost half of all security breaches are inadvertently caused by employees, according to IBM’s Cyber Security Intelligence Index. With phishing continuing to rise and more industries at risk of cyber-attacks, how does social engineering factor in? Types of Cyberattacks There are four primary types of cyberattacks: ransomware, phishing, spearphishing, and spoofing. Three of these rely…

Our Recommended Top Eight Collaboration Tools

Oct 5, 2017

Collaboration is key here at Rocket IT, like it is at many organizations. But when you have team members at client sites, working from home, and glued to the office, effective collaboration is a little harder than it is when you have everyone in the same room. To help your team thrive when collaborating in…

The Top Seven Reasons to Switch to Office 365 Today

Sep 22, 2017

We’re big fans of Office 365 in the office. It’s accessible from anywhere you can access the internet, keeps your programs automatically updated, and is infinitely better to transition to than the 8-loading-disc packages of the past. And we know others love it too! But there are a lot of great features that others don’t…

Join Rocket IT for Our How to Build a Strategic IT Plan On-Demand Webinar

Aug 25, 2017

When it comes to your technology, it can be difficult to get away from what’s in your rearview mirror and stay focused on the road ahead. You know where you want your organization to go, and that your technology investments should support your business goals, but building the strategic plan to get there isn’t as…

Five Gadgets for Rainy Weather

Aug 11, 2017

It’s been a very rainy summer here in Georgia. Since rain won’t really go away for another day, we’ve found five gadgets to keep you dry, no matter the season. 1. A personal weather station that connects with your smartphone and Alexa The Netatmo Weather Station connects to your smartphone (and Alexa!) to keep you…

What is Cybersecurity Insurance?

Jul 27, 2017

Cybersecurity insurance is a type of standalone coverage that helps organizations recover after a major data loss due to a security breach, ransomware, or another cyber incident. Much like general liability insurance, cybersecurity insurance protects you in the event of a virtual calamity. Cyber Security Coverage These cyber liability policies tend to cover any variety…

Security in the Age of Ransomware On-Demand Webinar

Jul 20, 2017

Nearly 77% of small businesses think they’re safe from cyberattacks, yet more than 40% have already been victims. Where is this disconnect, and how can you protect your organization? In the new age of ransomware, security has to be a top priority for every level at your organization. Find out what you can do to…

NotPetya Ransomware Variant Targets Human Resources

Jun 27, 2017

Another in a long string of recent cryptovirus attacks, a variant of the Petya ransomware known currently as “NotPetya” is striking HR departments around the globe. Currently disguised as an employee candidate email, malicious links in emails disguised as a Dropbox link to resumes and CVs are infecting computers and locking their files. Instead of…

How to Tell If An Email Address Is Valid

Jun 13, 2017

With most business transactions taking place at least in part over email, phishers have gotten very sophisticated at mimicking typical emails users receive and tricking innocent end-users into clicking on malicious links or opening corrupted files. So how do you tell if the email you just received is valid… Or a Trojan horse in disguise?…

Subscribe to our newsletter for more!

Something went wrong. Please check your entries and try again.