The IT Pro Blog

Read our latest posts

3 min read

5 Things Your IT Guy Doesn’t Want You to Know

We’re not asking if your IT guy is “really nice” or “funny” or “pleasant to have in the office”. We’re asking: do they properly support your business? Do they get the job DONE?

Read More

2 min read

IT Support for Law Firms: The Importance of IT Service Providers

As an IT Service Provider (ITSP), it’s easy to sound like broken records: is your information secure? Are your technology processes efficient? Is a...

Read More

2 min read

Hacker Tracker | July

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

2 min read

5 Ways Cybercriminals Are Taking Advantage of Pandemic Anxiety

While the world follows case counts, hospitalization rates, and ever-changing local guidelines, we follow the effects on cybersecurity. From our...

Read More

1 min read

How to Complete Proper Computer Drive Destruction

When your computer life has come to an end, proper destruction of your hard drive is vital to the security of your business. When disposing of an old...

Read More

1 min read

Bad Microsoft Update Crashes Outlook for Many Users

We’re hearing reports of 100,000’s of Microsoft Outlook users worldwide, all experiencing a problem with the program crashing on launch.

Read More

4 min read

What Does It Mean to “Partner” With an IT Company?

When researching the use of the word “partner” with IT Companies, it’s clear most (including us) over-use the word, and we’re not doing a good job...

Read More

2 min read

Increase in Shadow IT During Coronavirus Pandemic

Times have changed, and things are continuing to evolve in large part due to the coronavirus pandemic. As you continue to adapt to changes caused by...

Read More

2 min read

Remote Workers Click 8 Risky Web Links a Day on Average

Work-from-home status has become a reality for most employees. For employers, this means learning to mitigate a constantly evolving cybersecurity...

Read More

2 min read

Cybercriminals Do Not Necessarily Leave Your Network After a Ransomware Attack

It’s a common misconception that ransomware attackers quickly deploy and then retreat, so they remain anonymous. If you ask most victims of a...

Read More