2 min read
10 Steps to Proper Employee Offboarding for IT Security
We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.
2 min read
We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.
1 min read
Cybersecurity trends can teach us to learn from past mistakes. They can predict future problems and can enable us to be better prepared for future...
2 min read
When it comes to out-of-date applications, please don’t ignore them. While Adobe’s Flash Player officially hit its end of life on January 1, 2021....
2 min read
It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as —...
1 min read
When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed...
2 min read
CPA firms are lucrative targets for hackers. They store, send, and receive Personally Identifiable Information (PII) for a living. Because CPA firms...
2 min read
If you’ve considered bending the truth or “lies by omission” on your cybersecurity application, we strongly encourage you to reconsider. The...
2 min read
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
1 min read
A troubling new ransomware trend is gaining momentum. Known as the “pay or get breached” trend (also called the “double extortion” scheme), it gained...
2 min read
Among the many challenges of 2020, healthcare organizations in the U.S. took a big hit on the cybersecurity front. As if the COVID-19 pandemic wasn’t...