The IT Pro Blog

Read our latest posts

1 min read

Online Security Tips for Managing Your Retirement Account

You may or may not regularly think about your retirement accounts, depending on your age. Regardless of where you are at in your career, it is essential to think about the security of your account and best practices for managing it from a...

Read More

3 min read

Hacker Tracker | March in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

2 min read

Hacker Tracker | February in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

New Ransomware Tactic: Direct Calls to You

As many cyber actors enter the cybersecurity landscape, ransomware hackers are constantly on the prowl for new ways to breach networks and gain...

Read More

1 min read

New Microsoft Survey Says Businesses are Making Mistakes When It Comes to Hybrid Work

Microsoft recently published its Work Trend Index survey based on input from 31,000 workers across the globe. The survey highlights the various...

Read More

1 min read

New Proposed SEC Cybersecurity Rules Includes 48-hour Breach Reporting Requirement

Following increased enforcement in 2021, the SEC recently released its new cybersecurity rules on February 9, 2022 (reference). The rules are the...

Read More

1 min read

Senate Passes Cybersecurity Act Requiring Mandatory Cyberattack Reporting and More

Last Tuesday, the Senate passed new cybersecurity legislation regarding reporting of cyberattacks to the Cybersecurity Infrastructure Security Agency...

Read More

2 min read

Don’t Ignore Cybersecurity Just Because You Have Cyber Insurance

Let’s start at the beginning. Your organization just qualified for cybersecurity insurance. In addition, you probably noticed your premium increased....

Read More

1 min read

A Practical Approach to Implementing IRS Publication 4557

With tax season in full swing, it seems fitting to review the importance of IRS Publication 4557. For those not in the work of tax, it may be...

Read More

1 min read

Reused Passwords Are a Security Risk to Your Organization

Some people in life will have to learn by experience, and for some, even experience doesn’t teach the necessary lessons. Unfortunately we see this...

Read More