The IT Pro Blog

Read our latest posts

3 min read

What is an IRS Identity Protection PIN?

If your curiosity tricked you into clicking this blog open, we’re happy you’re here. This is not a clickbait topic – this is a topic that is vital for business owners and individuals to know about. A lesser-known term, an “IRS Identity Protection...

Read More

4 min read

How to Conduct a Cybersecurity Audit for Your Accounting Firm

According to a report from the Association of International Certified Professional Accountants, 60% of accounting firms have experienced some form of...

Read More

1 min read

PK Tech Continues CompTIA Authorized Service Center Status for 4th Consecutive Year

Phoenix, AZ- October 11, 2019– PK Tech announced today that its continued commitment to quality service and professionalism has been recognized for a...

Read More

3 min read

The Best of IT Consulting Phoenix, AZ

Nearly all Phoenix businesses use technology to generate revenue. However, many of these businesses treat technology hands-off expense to minimize....

Read More

3 min read

New Trend: Popular Websites Port Scanning You Without Prompt

We’ve recently learned about a new and intrusive trend where several well-known websites port scan your computer without prompt just by visiting...

Read More

2 min read

4 Steps to a Successful Backup & Disaster Recovery Plan

1. Make Sure You Have a Plan The case for backup and disaster recovery planning is straightforward: most small businesses cannot survive even one...

Read More

1 min read

4 Quality HIPAA Resources for Your Business

We’ll be the first to tell you no one person or company can “know it all”. That’s why at PK Tech, we pride ourselves on providing our clients with...

Read More

2 min read

Email Threads Are Being Used Maliciously in Automated Attacks

Beware: if you’re infected by the QBot Trojan, it’s possible to have your email threads (the chain of back and forth emails in any given email...

Read More