The IT Pro Blog

Read our latest posts

1 min read

PK Tech Expands to New Phoenix Office Space

September 19, 2022– PK Tech has expanded its operations to a larger office space in Uptown Phoenix. Less than one mile from their previous location, the new space is located at 5333 N 7TH St Ste B212, Phoenix, Arizona 85014-2814. Clients can expect...

Read More

3 min read

Hacker Tracker | July in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

IT Issues Negatively Affect Workplace Productivity and Morale

Covid-19 has shifted the way the world runs in many ways. Thankfully, much of our world has gone back to normal, and other parts are functioning well...

Read More

1 min read

Considering Buying a Company? You Are Purchasing Their IT Risks

Cybersecurity matters. You’re catching onto our theme – or maybe we sound like a broken record! You can’t ignore it for many reasons.

Read More

1 min read

Cybercriminals Fail When They Hit Multi-factor Authentication

We’ve touted the benefits of multi-factor authentication again and again on our blog because it matters.

Read More

1 min read

New Cybersecurity Risk Management Rules Proposed by SEC

On February 9, 2022, The Securities and Exchange Commission voted to propose new rules for cybersecurity risk management for registered investment...

Read More

1 min read

Ransomware Gang Targets Government, Finance, and Healthcare Organizations

Pysa ransomware, which became the dominant strain behind file-encrypting attacks last November, with a 400% rise in attacks on government...

Read More

1 min read

French Law Would Change U.S. Free WiFi Networks As We Know Them if Adopted Here

Ever wondered how laws in other countries could change the way we operate if they were activated in the United States?

Read More

1 min read

Password-Stealing Malware Targets Android Devices

There is a new type of malware that is spreading quickly. FluBot malware specifically targets Android devices, aiming to steal passwords, bank...

Read More

1 min read

Why You Should Properly Decommission Old Hardware

As IT professionals, we know managing IT assets throughout their entire lifecycle is crucial. It’s common to see businesses fail at the last stage of...

Read More