Posts

6 of our favorite Chrome extensions

Well-designed Chrome extensions make your browsing experience better. We’re talking optimal functionality and performance. In fact, many feature user-friendly interfaces with robust customization options. Here are some of the extensions that work particularly well on the job.

Build your own BYOD policy

Are you struggling with employees bringing their own devices to work? Get step-by-step instructions for creating a BYOD ("bring your own device") policy. These are the best practices for creating a BYOD policy, including acceptable use policy and BYOD wipe policy if a device is lost or stolen.
Data Security Concept

The complete guide to SMB data security

Data security is an important topic. If you lose your data—to a disaster, an accident, a cybersecurity incident or even a hardware failure—you’re in a tough spot. This guide will help you develop a strategy for maintaining data security, no matter what.
Featured Image

3 Sayings From The A-Team on the Benefits of IT Consulting for your Business

Hannibal, the team’s leader, always had a big, thick cigar pinched between grinning teeth as he said it, the smile suggesting that he had private expertise that guaranteed the team’s success, whatever the obstacle.
Penetration test text among binary code.

What Game of Thrones Can Teach You About DIY Penetration Testing

Penetration testing is when your team or an outside security consultant exploit your network’s vulnerabilities. The goal is to find all of the holes in your defenses and discover how to properly address them.
A red lock surrounded by binary.

Waging War on Ransomware

Fact is, not enough businesses have the cybersecurity measures needed to prevent ransomware attacks. So we prepared a short list of powerful ways to protect your network against them.

SMB Network Security Essentials

Just because your company is smaller doesn’t mean your network is safer. There are a handful of essential components for solid network security. Whether you do it yourself or contract with a third party, each of these should be a part of your network security plan.
Data Backup

5 Things to Consider for Data Backup

As you begin to look for data backup solutions, it’s important to keep your needs and priorities at the center of the conversation. There are a lot of data backup solutions out there. Some of them come with some pretty impressive features. But all the bells and whistles in the world don’t matter. What matters is making sure you have the information you need when you need it.
Gambling

Peace of Mind with Data Backup

Modern business is digital. The vast majority of the information you rely on day in, day out is stored electronically. All that data – customer information, financial records, inventory, orders, future plans, communication – all of it lives on a server somewhere. What happens if that server takes a hit?
Zombie Apocalypse

How Cybersecurity Is Like Surviving the Zombie Apocalypse

Here at PCX Technologies, we’re big Walking Dead fans. When we consider strategies for surviving the zombie apocalypse, we can’t help but think of cybersecurity, too. After all, cyber criminals aren’t all that different from zombies. We’d like to share some tips for keeping you safe from both.