The IT Pro Blog

Read our latest posts

2 min read

Hacker Tracker | April in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be...

Read More

2 min read

Beware: Your Text Messages Could Be Rerouted to Hackers for as Little as $16

A nasty new attack has recently come to light thanks to Motherboard/Vice: attackers silently redirecting your text messages so they can compromise...

Read More

2 min read

FYI Microsoft’s “Shared Responsibility Model” for Office 365 Means YOU Are Responsible Backups, NOT Microsoft!

Are you under the impression that Microsoft is responsible for the backups inside of solutions like Office 365, Exchange Online, OneDrive and...

Read More

2 min read

To Keep Your Network Secure, Use Multi-factor Authentication 100% of the Time

Curious how most cyber-criminal hackers gain access to enterprise networks? It’s simple: they steal or guess usernames and passwords.

Read More

1 min read

The Remote Work Trend is Here to Stay. Is Your Business Prepared?

We’re over a year into the COVID-19 global pandemic, and the million-dollar question remains: is remote work here to stay? It’s a great question and...

Read More

2 min read

What We Can Learn from the City of Kingman’s Criminal Cyberattack

A massive cyberattack targeted the Arizona City of Kingman’s technology infrastructure in early March. While categorized by officials as a “criminal...

Read More

1 min read

59% of Buyers are Likely to Avoid Companies that Suffered from a Cyberattack in the Past Year

In the ever-changing and competitive marketplace (Thank you global pandemic!), gaining and maintaining buyers for your products or services is more...

Read More

1 min read

Report Finds Companies Have Massive Amounts of Inactive User Accounts

We talked about the concept of offboarding earlier this week on our blog. Why is it so important? Two words: risk & exposure.

Read More

2 min read

10 Steps to Proper Employee Offboarding for IT Security

We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.

Read More

1 min read

70% of Consumers Believe That Businesses Aren’t Doing Enough to Secure Their Personal Information

Cybersecurity trends can teach us to learn from past mistakes. They can predict future problems and can enable us to be better prepared for future...

Read More