Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
Tools for Working from Home: 2020 Christmas Gift Ideas from the Proactive IT Team

Tools for Working from Home: 2020 Christmas Gift Ideas from the Proactive IT Team

by Stephen Kennen | Dec 15, 2020 | Tech Tips

It’s been some months since the COVID-19 crisis began. Remote work is now mainstream.   But on the other side of this transition, do your team members have everything needed for their at-home workspaces? If not, consider purchasing Christmas gifts that make your...
Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue

Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue

by Stephen Kennen | Nov 18, 2020 | Network Security

Should you pay a ransom to cybercriminals? Is this action illegal?  Before I answer that question, I will say that—legal or not—paying the bad guys is not normally a good idea.  For starters, can we really trust them to keep their word? Who says they will decrypt your...
Meeting Your Billable Hours Goal Post-COVID-19: How Technology Can Help

Meeting Your Billable Hours Goal Post-COVID-19: How Technology Can Help

by Stephen Kennen | Sep 22, 2020 | General, Managed IT, Uncategorized

Is your law firm on track to meet its billable hours goal?   Or has working from home (WFH) begun to negatively affect profitability?   As the president of an IT company that serves law firms, I understand the high value placed on productivity.   While work ethic,...
How to Efficiently Search for an Email in Outlook

How to Efficiently Search for an Email in Outlook

by Stephen Kennen | Sep 10, 2020 | Tech Tips

Do you know how to search for an email in Outlook efficiently? Or does this scenario sound familiar…    It’s a busy Monday, and you need to find an email that John Doe sent a month ago. You type “John Doe” in the mailbox search...
Do Your At-Home Attorneys Use this WFH Setup? If So, Your Data Is at Risk

Do Your At-Home Attorneys Use this WFH Setup? If So, Your Data Is at Risk

by Stephen Kennen | Aug 21, 2020 | Network Security

When working from home (WFH) became a necessity, our legal clients quickly went remote.    I suspect many other Charlotte law firms did the same.   But I also suspect that—in the hasty transition to WFH—some firms allowed attorneys to directly access corporate data...
« Older Entries
Next Entries »

Recent Posts

  • 10 Practical Ways to Use AI in Your Business
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does)
  • The Ultimate Guide to Microsoft 365 Copilot
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC 

Sign Up to Receive our Blog!

[mc4wp_form id="1096"]

Latest Articles

  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does) June 29, 2025
  • The Ultimate Guide to Microsoft 365 Copilot May 21, 2025
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness April 25, 2025
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC  March 27, 2025
  • Facebook
  • X
  • RSS

Copyright © 2025 Proactive IT. All Rights Reserved.