1 min read
Kids Are Targeted by Hackers: How to Protect Your Child Online
No matter the age of your kids – we’re going to take a wild guess that, in many instances, your kids are more tech-savvy than you are. Have you ever...
1 min read
No matter the age of your kids – we’re going to take a wild guess that, in many instances, your kids are more tech-savvy than you are. Have you ever...
2 min read
Many businesses are feeling it – they go to fill out their annual cyber insurance application, and suddenly, there are more questions and more...
2 min read
In big cybersecurity news, the Federal Trade Commission (FTC) is officially taking action against Chegg Inc. for mismanaged cybersecurity that...
2 min read
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
2 min read
Most businesses have backup solutions to protect themselves in the event of a ransomware attack. This is a great first layer of protection. However,...
2 min read
Almost every business has to outsource. Of course, outsourcing varies from business to business, but you will be hard-pressed to find a company that...
2 min read
The days of using your favorite color or your pet’s name as your password are long gone – in fact, they never should have been a thing in the first...
1 min read
Do you need to revisit your cybersecurity plan? That’s a valid question. This blog will cover recent changes to the FTC Safeguards Rule and what you...
2 min read
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK...
2 min read
In a world of growing remote and hybrid work schedules, collaboration apps have emerged as a way for organizations to stay interconnected regardless...