The IT Pro Blog

Read our latest posts

3 min read

Working Through COVID-19: Dual Monitors at Home

Many of our clients and businesses in general are experiencing the transition into the WFH (work-from-home) model. We’re seeing the challenges first hand and therefore we’re making it our mission to share advice that can benefit any business dealing...

Read More

2 min read

Most Common Passwords (And Why You Shouldn’t Be Using These)

Passwords. The bane of our existence for some (remembering them, that is) and an after thought for others. We’re here to tell you that passwords...

Read More

1 min read

Macs Don’t Get Viruses…Or Do They?

If you think just because you use a Mac you’re free of malware risks, think again. The malware problems with Apple products are only getting worse....

Read More

2 min read

Hacker Tracker | March

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

How To Streamline Business Operations During COVID-19

A Guide to Keeping Your Business Running During a Global Pandemic Health and well-being are of the utmost importance as we’re faced with an...

Read More

1 min read

Watch Out for Domain Listing and Website Listing Service Scams!

PSA: Several of our clients have sent over the following “Website Listing Service” letters that have been mailed to them. EXAMPLE:

Read More

3 min read

Are You Properly Protecting Your Passwords? This List is for You.

Are you currently protecting your passwords for personal or business use? Curious about the best way to be doing so? We’ve compiled a list of some of...

Read More

2 min read

Do I need Cybersecurity Insurance for my business?

If these are questions you’ve asked yourself, this blog is for you.

Read More

1 min read

How To Destroy Your Computer’s Hard Drive

When your computer life has come to an end, proper destruction of your hard drive is vital to the security of your business. When disposing of an old...

Read More

1 min read

Hacker Tracker | February

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More