1 min read
Report Finds Companies Have Massive Amounts of Inactive User Accounts
We talked about the concept of offboarding earlier this week on our blog. Why is it so important? Two words: risk & exposure.
Read More1 min read
We talked about the concept of offboarding earlier this week on our blog. Why is it so important? Two words: risk & exposure.
Read More2 min read
We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.
1 min read
Cybersecurity trends can teach us to learn from past mistakes. They can predict future problems and can enable us to be better prepared for future...
2 min read
When it comes to out-of-date applications, please don’t ignore them. While Adobe’s Flash Player officially hit its end of life on January 1, 2021....
2 min read
It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as —...
1 min read
When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed...
2 min read
CPA firms are lucrative targets for hackers. They store, send, and receive Personally Identifiable Information (PII) for a living. Because CPA firms...
1 min read
At PK Tech, we service several industries, but our roots lie deep in CPA firms. Since the beginning, PK Tech has provided IT support for CPA firms,...
2 min read
If you’ve considered bending the truth or “lies by omission” on your cybersecurity application, we strongly encourage you to reconsider. The...
2 min read
What is Microsoft Teams, and how can your business be integrating it? We’re so glad you asked.