2 min read
The IT Pro Blog
Read our latest posts
Cybersecurity

4 min read
The Importance of Cybersecurity Training for Accountants
Even outside of “tax season,” accountants face a unique set of challenges regarding cybersecurity. Often entrusted with handling sensitive financial...

3 min read
Change is on the Horizon for the Cybersecurity Insurance Market
Along with the constant evolution of cybersecurity, the cybersecurity insurance market is also seeing change coming down the pipeline. As...

2 min read
New NIST Digital Identity Guidelines Make Password Resets a Requirement
The National Institute of Standards and Technology (NIST) recently released a draft of its Digital Identity Guidelines, known as NIST SP 800-63. This...

3 min read
What is an IRS Identity Protection PIN?
If your curiosity tricked you into clicking this blog open, we’re happy you’re here. This is not a clickbait topic – this is a topic that is vital...

4 min read
How to Conduct a Cybersecurity Audit for Your Accounting Firm
According to a report from the Association of International Certified Professional Accountants, 60% of accounting firms have experienced some form of...

2 min read
Is Online Accounting Safe?
We now access our bank accounts online, check our stocks on our phones, and do much more online. For both personal and business accounting, more and...

2 min read
Email Impersonation Scheme Costs Massachusetts Town Big Money
It’s easy to miss news of the cybersecurity threats and attacks happening almost everywhere. At PK Tech, our goal is to educate and offer proactive...

3 min read
AI Phone Hacks Are on the Rise
You now not only have to worry that email attachments are real. Now, there is a very real fear of Artificial Intelligence (AI) impersonating voices...

3 min read
What is SEC Regulation S-P and How Is It Changing?
The SEC is adopting significant cybersecurity amendments to Regulation S-P.