Blog Library
Library of information-filled blogs written by PCA contributors.
When Disaster Strikes, What’s Your Backup Plan?
What’s your backup and recovery plan? Disasters happen. Many companies don’t survive, because they didn’t have a disaster and recovery plan in place.
DIY Technology Is Over, Proven By Local Ransomware Attacks
Earlier this week, one of our teammates sent me an article late in the day to read from our local NBC affiliate entitled “Over thirty Arkansas counties impacted by cyber-attack”. The very next morning, I was in a meeting discussing this very topic: ransomware.
Warning! Phishing Doesn’t Look so Phishy
As of January of 2022, the most common phishing scheme used to steal data from businesses appears to be sent by company vendors.
Building a Culture of Cybersecurity
Cybersecurity can be underestimated, and must be woven into the culture of your workplace and prioritized. So, how do you foster a cybersecurity culture within your entire organization?
Shortcuts that are WORTH Taking
Some Shortcuts are worth taking. Use this guide to learn how Control (CTRL) commands can speed up your workflow, saving you time.
It’s Time for A Mid-Year Assessment
Now is a perfect time for a mid-year assessment of where you are in your businesses and preparing for next year’s goals and objectives. While doing so, how are you planning for cybersecurity risks, technology needs and the ever-changing landscape that businesses are experiencing in 2022?
Help! IT’s Just Too Much
Picture it – the year 2000. We had just survived Y2K and the world was a much better place. IT was simpler then. It was completely normal for an IT department for a mid-sized business to consist of one or even two people to take care of it all. That is not the case in 2022.
Why IT Needs a Seat at the Table: The Threats Are Real
Technology is moving faster than ever. Whether it’s targeted warfare, or just “spraying” to determine who’s vulnerable, the threats are real.
Oh Password, Where Art Thou?
Who hates having to remember passwords? Have you ever longed for a “passwordless” society? Good news: Microsoft has now taken steps towards that possibility.
4 Steps to Securing your Personal Data After a Breach
Protecting your personal data is a growing concern in our society. Cyber attacks and data leaks are reported constantly, and we are all potential victims.