The IT Pro Blog

Read our latest posts

2 min read

The 8 Best Features of Microsoft Teams Phone

When it comes to the vast array of Microsoft products, Microsoft Teams Phone is a lesser-known but highly useful Voice over IP (VoIP) software product. Many businesses struggle to find the best VoIP business phone solutions for their specific needs....

Read More

2 min read

LockBit Ransomware Gang Apologies After Hospital Attack, Reaffirms Dentists Are OK To Attack

The LockBit ransomware gang recently targeted the Hospital for Sick Children (SickKids), a teaching and research hospital in Toronto that focuses on...

Read More

2 min read

Drizly CEO Personally Sanctioned By FTC for Bad Cybersecurity Practices

We’ve all been hearing the whispers that the FTC is getting more serious about ransomware and data breaches. There have been a few select examples...

Read More

2 min read

4 Ways to Manage Productivity with Multi-factor Authentication

As ransomware continues to gain momentum and cyber gangs are as brazen as ever, many organizations are faced with the same conundrum as we head into...

Read More

2 min read

Best Social Media Platforms for Your Business

As the headlines have been taken over by negative news around Twitter and TikTok, many wonder whether social media is even worth it. When it comes to...

Read More

2 min read

Hacker Tracker | December

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

2 min read

Investing in IT is Important: Just Ask Southwest Airlines

Blame it on the holidays, staffing shortages, or 100-year winter storms, but here’s the harsh truth: Southwest Airlines’ epic travel failure this...

Read More

2 min read

How NOT to Install Wireless Access Points in Your Business

We interact with many small businesses in Arizona and see how “IT guys” and other IT companies install network equipment.

Read More

2 min read

Hacker Tracker | November

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

3 min read

Get the Most Out of Microsoft 365 Lists

If you have countless notes on your iPhone and a stack of paper with scribbled lists on your desk–this blog might be for you. Beyond more complex...

Read More