Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
9 North Carolina Cybersecurity Incidents That Happened in 2019

9 North Carolina Cybersecurity Incidents That Happened in 2019

by Stephen Kennen | Jan 29, 2020 | Data Compliance, Network Security

In 2019, our state saw its share of cybercrime. From ransomware to malicious code, I can document at least 9 North Carolina cybersecurity incidents that happened last year. And here’s what’s sobering. This is probably the tip of the iceberg as CSO reports the...
An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

by Stephen Kennen | Jan 7, 2020 | Managed IT, Network Security

Dear Clients and Colleagues,  I’ve been talking about cybersecurity. A lot.  If you thought we turned up the volume on cybersecurity-focused content and education in 2019, your observation was correct—we did.   In 2020, our message isn’t changing....
I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?

I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?

by Stephen Kennen | Nov 22, 2019 | General

You got an email from Microsoft.  It’s assertive.  It’s confident.  And it’s talking about your business getting something called a Software Asset Management (SAM) engagement.  What is a Microsoft SAM engagement? And how should you respond to the...
Why Your Business Needs a Cyber Breach Response Plan

Why Your Business Needs a Cyber Breach Response Plan

by Stephen Kennen | Oct 29, 2019 | Network Security

71 days. This is the median time that a cybersecurity breach went undetected by organizations in North, Central, and South America according to FireEye. This is known as dwell time, which FireEye defines as the following:   Dwell time is calculated as the...
The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

by Stephen Kennen | Oct 15, 2019 | Business Continuity, Network Security

It should be surprising, but it’s not.  If you haven’t heard yet, the North Carolina State Bar was hit by a ransomware attack.  Our State Bar announced on Thursday, October 3 that (on September 30) ransomware had infected the Bar’s servers. According to the...
« Older Entries
Next Entries »

Recent Posts

  • 10 Practical Ways to Use AI in Your Business
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does)
  • The Ultimate Guide to Microsoft 365 Copilot
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC 

Sign Up to Receive our Blog!

[mc4wp_form id="1096"]

Latest Articles

  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does) June 29, 2025
  • The Ultimate Guide to Microsoft 365 Copilot May 21, 2025
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness April 25, 2025
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC  March 27, 2025
  • Facebook
  • X
  • RSS

Copyright © 2025 Proactive IT. All Rights Reserved.