Megan Schutz

1 min read

Report Finds Companies Have Massive Amounts of Inactive User Accounts

We talked about the concept of offboarding earlier this week on our blog. Why is it so important? Two words: risk & exposure.

Read More

2 min read

10 Steps to Proper Employee Offboarding for IT Security

We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.

Read More

1 min read

70% of Consumers Believe That Businesses Aren’t Doing Enough to Secure Their Personal Information

Cybersecurity trends can teach us to learn from past mistakes. They can predict future problems and can enable us to be better prepared for future...

Read More

2 min read

Out-of-Date Applications Rank as a Top Vulnerability–Do You Still Have Flash Installed?

When it comes to out-of-date applications, please don’t ignore them. While Adobe’s Flash Player officially hit its end of life on January 1, 2021....

Read More

2 min read

3 Quick IT Best Practices for Law Firms

It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as —...

Read More

1 min read

The 3 Most Common Phishing Techniques Used to Attack Your PC

When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed...

Read More

2 min read

IRS Publication 4557 – Safeguarding Taxpayer Data

CPA firms are lucrative targets for hackers. They store, send, and receive Personally Identifiable Information (PII) for a living. Because CPA firms...

Read More

1 min read

7 Questions to Ask When Choosing a Portal for Your CPA Firm

At PK Tech, we service several industries, but our roots lie deep in CPA firms. Since the beginning, PK Tech has provided IT support for CPA firms,...

Read More

2 min read

Bending the Truth on Your Cybersecurity Insurance Application? See How It Cost a Healthcare Provider $4.125 Million.

If you’ve considered bending the truth or “lies by omission” on your cybersecurity application, we strongly encourage you to reconsider. The...

Read More

2 min read

8 Best Practices for Getting the Most Out of Microsoft Teams Channels

What is Microsoft Teams, and how can your business be integrating it? We’re so glad you asked.

Read More