https://www.pcx.net/wp-content/uploads/2018/07/shutterstock_407666284-3.jpg 266 702 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-09-13 16:12:402018-07-31 16:59:06Why and how to lock down user access
Data breaches are on the rise across the business world. Are you at risk of a loss that can put you out of business? Make sure you're following good user access controls to protect your data, reduce your risks, and get your employees to buy into security.
https://www.pcx.net/wp-content/uploads/2018/09/PCX_phishing_FeatImg.jpg 266 692 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-08-30 00:00:042018-08-30 13:50:26The complete guide to phishing attacks
Discover what phishing attacks are and how these cybersecurity threats can damage your small business. Also, learn seven simple and effective ways to keep these malicious email campaigns at bay, including using training, email encryption and antivirus programs.
https://www.pcx.net/wp-content/uploads/2018/08/PCX_blog.jpg 266 702 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-08-23 15:53:012018-08-29 16:50:24The biggest cybersecurity threats of 2018 (and how to stop them)
SMBs face plenty of cybersecurity threats. It's essential to to know the challenges of keeping your company safe. While there are several ways cyberattacks can threaten your small business, and steps you can take to stop them. Get the scoop on what you can do to protect your business.
https://www.pcx.net/wp-content/uploads/2018/07/shutterstock_590498048.jpg 266 702 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-08-09 15:55:132018-07-10 14:01:21The 4 things you need for password security
Many cyberattacks are only successful because companies fail to encourage employees to create, store and manage passwords the right way. SMB owners would be wise to close the password security gap. Here are 4 steps that all employees should follow to ensure they are maximizing their password security.
https://www.pcx.net/wp-content/uploads/2018/07/woman-backing-up-data.png 266 702 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-07-26 15:57:142018-07-27 16:56:40Cloud storage wars: Dropbox vs. Google Drive vs. OneDrive
We’ve covered the most popular three consumer options below. If you’re looking for something for your personal use or even for a small business, each of these is a viable option. If you’re looking for something a little more robust, we suggest talking to your IT support provider.
https://www.pcx.net/wp-content/uploads/2018/06/shutterstock_139515002.jpg 266 702 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-07-12 15:57:512018-06-19 17:48:256 of our favorite Chrome extensions
Well-designed Chrome extensions make your browsing experience better. We’re talking optimal functionality and performance. In fact, many feature user-friendly interfaces with robust customization options. Here are some of the extensions that work particularly well on the job.
https://www.pcx.net/wp-content/uploads/2018/06/PCX_IT_BYOD.jpg 266 692 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-06-22 00:00:052018-06-22 15:14:18Build your own BYOD policy
Are you struggling with employees bringing their own devices to work? Get step-by-step instructions for creating a BYOD ("bring your own device") policy. These are the best practices for creating a BYOD policy, including acceptable use policy and BYOD wipe policy if a device is lost or stolen.
https://www.pcx.net/wp-content/uploads/2018/05/PCX_IT_Consulting_FeatImg3.jpg 266 692 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-05-29 00:00:312018-08-29 15:46:12The complete guide to SMB data security
Data security is an important topic. If you lose your data—to a disaster, an accident, a cybersecurity incident or even a hardware failure—you’re in a tough spot. This guide will help you develop a strategy for maintaining data security, no matter what.
https://www.pcx.net/wp-content/uploads/2018/02/PCX_IT_Consulting_FeatImg.jpg 266 692 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-03-08 19:57:282018-04-16 20:39:353 Sayings From The A-Team on the Benefits of IT Consulting for your Business
Hannibal, the team’s leader, always had a big, thick cigar pinched between grinning teeth as he said it, the smile suggesting that he had private expertise that guaranteed the team’s success, whatever the obstacle.
https://www.pcx.net/wp-content/uploads/2018/01/penetration-testing.jpg 266 702 PCX Technologies /wp-content/uploads/2017/05/pcx-logo.png PCX Technologies2018-01-18 10:40:132018-03-20 15:23:35What Game of Thrones Can Teach You About DIY Penetration Testing
Penetration testing is when your team or an outside security consultant exploit your network’s vulnerabilities. The goal is to find all of the holes in your defenses and discover how to properly address them.