Megan Schutz

1 min read

5 Questions to Ask Before Transitioning to a Software Vendor’s Cloud Platform

Introduction While software vendors typically provide a dose of value-add service to your business, it’s important to spend the time up front to understand their cloud offerings and weigh the Pros and Cons before you sign a long term agreement.

Read More

2 min read

A 5-Step Guide to Creating a Security Incident Response Plan

Did you know that 90% of cybersecurity attacks start with an email? Yes, you read that right. That’s why we’re tackling this topic: it’s important...

Read More

2 min read

Hacker Tracker | July

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

2 min read

Why Buy a Computer from an IT Firm Over Going Direct

Disclaimer: We’re an IT firm. We recommend that you evaluate the data and choose a path that best serves your business’s needs. This advice is...

Read More

3 min read

Arizona’s Data Breach Notification Law

Did you know Arizona has a legislation that requires private entities or government agencies to notify individuals who have been impacted by security...

Read More

2 min read

Environmental Responsibility Series Part 2: 7 Ways Your Business Can Reduce Its Environmental Impact

We only get one planet earth. That’s why, at PK Tech, we believe in doing our part as a business to reduce environmental impact through small,...

Read More

2 min read

HIPAA | Technology Survival Guide 

Maybe you’re HIPAA compliant but still looking for ways to continue to improve your healthcare organization from a technology perspective. Enter the...

Read More

2 min read

What Using a Free Email Service Says About Your Business

This blog is for you if you are a business and have a free email account that ends in any of the following: Aol.com Yahoo.com...

Read More

2 min read

Cybercriminals Do Not Necessarily Leave Your Network After a Ransomware Attack

It’s a common misconception that ransomware attackers quickly deploy and then retreat, so they remain anonymous. If you ask most victims of a...

Read More