1 min read
How To Destroy Your Computer’s Hard Drive
When your computer life has come to an end, proper destruction of your hard drive is vital to the security of your business. When disposing of an old...
1 min read
When your computer life has come to an end, proper destruction of your hard drive is vital to the security of your business. When disposing of an old...
2 min read
The US Department of Treasury’s Office of Foreign Assets Control (OFAC) stated the following on October 1, 2020:
2 min read
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
1 min read
In this blog, we’ll be highlighting an emerging threat known as lateral phishing.
2 min read
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
1 min read
If you think just because you use a Mac you’re free of malware risks, think again. The malware problems with Apple products are only getting worse....
3 min read
Are you currently protecting your passwords for personal or business use? Curious about the best way to be doing so? We’ve compiled a list of some of...
2 min read
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
3 min read
Somewhere — right now — countless cybercriminals are planning ransomware attacks and have likely been planning each attack for weeks or even months.
1 min read
A recent study predicts that managed service providers (such as us, PK Tech) are likely to see a boom in demand post-coronavirus. For many Managed...