The IT Pro Blog

Read our latest posts

2 min read

A 5-Step Guide to Creating a Security Incident Response Plan

Did you know that 90% of cybersecurity attacks start with an email? Yes, you read that right. That’s why we’re tackling this topic: it’s important and highly relevant to anyone reading this.

Read More

2 min read

What To Do If Your IT Guy Goes Out of Business Because of the Coronavirus

We’re hearing from our peers located in coastal cities first about early coronavirus-related effects on the IT industry. One IT-related topic is the...

Read More

3 min read

What To Do If You Get CryptoLocker Ransomware Attacked

CryptoLocker ransomware attacks are scary. You’ll suddenly see a note appear on your computer screen stating that your computer is locked or files...

Read More

3 min read

Working Through COVID-19: Dual Monitors at Home

Many of our clients and businesses in general are experiencing the transition into the WFH (work-from-home) model. We’re seeing the challenges first...

Read More

2 min read

Most Common Passwords (And Why You Shouldn’t Be Using These)

Passwords. The bane of our existence for some (remembering them, that is) and an after thought for others. We’re here to tell you that passwords...

Read More

1 min read

Macs Don’t Get Viruses…Or Do They?

If you think just because you use a Mac you’re free of malware risks, think again. The malware problems with Apple products are only getting worse....

Read More

2 min read

Hacker Tracker | March

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

How To Streamline Business Operations During COVID-19

A Guide to Keeping Your Business Running During a Global Pandemic Health and well-being are of the utmost importance as we’re faced with an...

Read More

1 min read

Watch Out for Domain Listing and Website Listing Service Scams!

PSA: Several of our clients have sent over the following “Website Listing Service” letters that have been mailed to them. EXAMPLE:

Read More

3 min read

Are You Properly Protecting Your Passwords? This List is for You.

Are you currently protecting your passwords for personal or business use? Curious about the best way to be doing so? We’ve compiled a list of some of...

Read More