The IT Pro Blog

Read our latest posts

2 min read

Email Threads Are Being Used Maliciously in Automated Attacks

Beware: if you’re infected by the QBot Trojan, it’s possible to have your email threads (the chain of back and forth emails in any given email conversation) stolen and used to make an attack look more authentic. How? Let’s break it down in our...

Read More

2 min read

August Microsoft Patch Tuesday Critical Update – Zerologon Active Directory Attack is Severe

Microsoft’s August patch Tuesday Windows Updates included the following gem that’s described as “one of the most severe bugs ever reported to...

Read More

2 min read

Environmental Responsibility Series Part 2: 7 Ways Your Business Can Reduce Its Environmental Impact

We only get one planet earth. That’s why, at PK Tech, we believe in doing our part as a business to reduce environmental impact through small,...

Read More

2 min read

38% of Surveyed Small Businesses Budget Less than $1000 a Year Toward Cybersecurity

COVID-19 has caused a growing strain on small to medium-sized businesses due to a greater need for cybersecurity in an increasingly remote work era....

Read More

2 min read

Hacker Tracker | August in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

Study Predicts Managed Service Providers Will See a Boom Post-Pandemic

A recent study predicts that managed service providers (such as us, PK Tech) are likely to see a boom in demand post-coronavirus. For many Managed...

Read More

4 min read

Hacker Tracker | July in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

Cybersecurity Trend: Lateral Phishing

In this blog, we’ll be highlighting an emerging threat known as lateral phishing.

Read More

3 min read

Is Your Company Characterized by Weak Security? Here’s a List of the Largest Breach Fines, Penalties and Settlements in Recent Years

Weak security is a multifaceted problem for many companies: not only does it mean poor cybersecurity for sensitive data, it also means the potential...

Read More

3 min read

3 Key Signs of a Potential Ransomware Attack

Somewhere — right now — countless cybercriminals are planning ransomware attacks and have likely been planning each attack for weeks or even months.

Read More