The IT Pro Blog

Read our latest posts

2 min read

Out-of-Date Applications Rank as a Top Vulnerability–Do You Still Have Flash Installed?

When it comes to out-of-date applications, please don’t ignore them. While Adobe’s Flash Player officially hit its end of life on January 1, 2021. Businesses all over the world still have Adobe Flash installed, making the risk greater than ever....

Read More

2 min read

3 Quick IT Best Practices for Law Firms

It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as —...

Read More

1 min read

The 3 Most Common Phishing Techniques Used to Attack Your PC

When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed...

Read More

2 min read

IRS Publication 4557 – Safeguarding Taxpayer Data

CPA firms are lucrative targets for hackers. They store, send, and receive Personally Identifiable Information (PII) for a living. Because CPA firms...

Read More

1 min read

7 Questions to Ask When Choosing a Portal for Your CPA Firm

At PK Tech, we service several industries, but our roots lie deep in CPA firms. Since the beginning, PK Tech has provided IT support for CPA firms,...

Read More

2 min read

Bending the Truth on Your Cybersecurity Insurance Application? See How It Cost a Healthcare Provider $4.125 Million.

If you’ve considered bending the truth or “lies by omission” on your cybersecurity application, we strongly encourage you to reconsider. The...

Read More

2 min read

8 Best Practices for Getting the Most Out of Microsoft Teams Channels

What is Microsoft Teams, and how can your business be integrating it? We’re so glad you asked.

Read More

2 min read

Chromebooks Sure Are Cheap — Are They Right for My Business?

Let’s take a reality check: should you use Chromebooks in your business? Great question.

Read More

2 min read

Hacker Tracker | February in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

New Ransomware Trend “Pay or Get Breached” Is on the Rise

A troubling new ransomware trend is gaining momentum. Known as the “pay or get breached” trend (also called the “double extortion” scheme), it gained...

Read More