The IT Pro Blog

Read our latest posts

Cybersecurity (24)

4 min read

Hacker Tracker | July in Review

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

1 min read

Cybersecurity Trend: Lateral Phishing

In this blog, we’ll be highlighting an emerging threat known as lateral phishing.

Read More

3 min read

Is Your Company Characterized by Weak Security? Here’s a List of the Largest Breach Fines, Penalties and Settlements in Recent Years

Weak security is a multifaceted problem for many companies: not only does it mean poor cybersecurity for sensitive data, it also means the potential...

Read More

3 min read

3 Key Signs of a Potential Ransomware Attack

Somewhere — right now — countless cybercriminals are planning ransomware attacks and have likely been planning each attack for weeks or even months.

Read More

1 min read

Cybersecurity Report Reveals 67% of Malware Was Delivered Over HTTPS!

Watchguard recently released its latest report for Q1 2020, providing analytics from 44,000 global appliances. In general, upwards of two-thirds of...

Read More

2 min read

Hackers Could Use USB Chargers to Destroy Your Devices

You know your USB chargers? They seem innocent and straightforward enough, right? Think again.

Read More

2 min read

Hacker Tracker | July

Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...

Read More

2 min read

5 Ways Cybercriminals Are Taking Advantage of Pandemic Anxiety

While the world follows case counts, hospitalization rates, and ever-changing local guidelines, we follow the effects on cybersecurity. From our...

Read More

2 min read

Remote Workers Click 8 Risky Web Links a Day on Average

Work-from-home status has become a reality for most employees. For employers, this means learning to mitigate a constantly evolving cybersecurity...

Read More

2 min read

Cybercriminals Do Not Necessarily Leave Your Network After a Ransomware Attack

It’s a common misconception that ransomware attackers quickly deploy and then retreat, so they remain anonymous. If you ask most victims of a...

Read More