Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
9 North Carolina Cybersecurity Incidents That Happened in 2019

9 North Carolina Cybersecurity Incidents That Happened in 2019

by Stephen Kennen | Jan 29, 2020 | Data Compliance, Network Security

In 2019, our state saw its share of cybercrime. From ransomware to malicious code, I can document at least 9 North Carolina cybersecurity incidents that happened last year. And here’s what’s sobering. This is probably the tip of the iceberg as CSO reports the...
An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

by Stephen Kennen | Jan 7, 2020 | Managed IT, Network Security

Dear Clients and Colleagues,  I’ve been talking about cybersecurity. A lot.  If you thought we turned up the volume on cybersecurity-focused content and education in 2019, your observation was correct—we did.   In 2020, our message isn’t changing....
I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?

I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?

by Stephen Kennen | Nov 22, 2019 | General

You got an email from Microsoft.  It’s assertive.  It’s confident.  And it’s talking about your business getting something called a Software Asset Management (SAM) engagement.  What is a Microsoft SAM engagement? And how should you respond to the...
Why Your Business Needs a Cyber Breach Response Plan

Why Your Business Needs a Cyber Breach Response Plan

by Stephen Kennen | Oct 29, 2019 | Network Security

71 days. This is the median time that a cybersecurity breach went undetected by organizations in North, Central, and South America according to FireEye. This is known as dwell time, which FireEye defines as the following:   Dwell time is calculated as the...
The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

by Stephen Kennen | Oct 15, 2019 | Business Continuity, Network Security

It should be surprising, but it’s not.  If you haven’t heard yet, the North Carolina State Bar was hit by a ransomware attack.  Our State Bar announced on Thursday, October 3 that (on September 30) ransomware had infected the Bar’s servers. According to the...
« Older Entries
Next Entries »

Recent Posts

  • The Real Impact of Managed IT Services from Proactive IT on Your Business Success
  • The Profit Power of Predictable IT Spending
  • Why One-Person IT Teams Can’t Protect a Business in 2026
  • 5 Ways Proactive IT Protects Your Business When Disaster Strikes
  • 10 Practical Ways to Use AI in Your Business

Sign Up to Receive our Blog!

[mc4wp_form id="1096"]

Latest Articles

  • The Real Impact of Managed IT Services from Proactive IT on Your Business Success April 7, 2026
  • The Profit Power of Predictable IT Spending March 10, 2026
  • Why One-Person IT Teams Can’t Protect a Business in 2026 January 12, 2026
  • 5 Ways Proactive IT Protects Your Business When Disaster Strikes December 18, 2025
  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • Facebook
  • X
  • RSS

Copyright © 2026 Proactive IT. All Rights Reserved.