Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
What Salesforce Reveals about the Risks of Cloud Computing

What Salesforce Reveals about the Risks of Cloud Computing

by Stephen Kennen | Jun 14, 2019 | Cloud Computing

It was called “the worst service disruption in Salesforce’s history.” Yes, I’m referring to the recent Salesforce disaster that sparked over 3,000 outages and affected users across the United States according to CRN. It’s a timely reminder that there are benefits and...
The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training

The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training

by Stephen Kennen | May 29, 2019 | Network Security

It’s cliche in the IT industry, but it’s true. Your employees are your biggest vulnerability. At Proactive IT, we’re all about securing your network, encrypting your data, and making sure your endpoint protection is up-to-date. But we can’t prevent employee error....
Is Cloud Storage Data Loss Possible? According to Microsoft, Yes It Is.

Is Cloud Storage Data Loss Possible? According to Microsoft, Yes It Is.

by Stephen Kennen | May 24, 2019 | Cloud Computing

Your business has done the smart thing. From internal emails to shared files, you’ve placed all your company’s essential data in the cloud. No more updates for fully hosted applications. No more security patches. And certainly no more worries about losing your data....
A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees

A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees

by Stephen Kennen | May 16, 2019 | Network Security

Their network was secure. Their data was encrypted. Their firewall was fully functioning.   But that didn’t stop a sophisticated spear phishing scheme from tricking our client into forfeiting a five-figure sum. Each week my team encounters another example of...
What Is PCI Compliance? A Regulation Your Business Can’t Ignore

What Is PCI Compliance? A Regulation Your Business Can’t Ignore

by Stephen Kennen | Apr 22, 2019 | Data Compliance

It doesn’t matter if your business is a restaurant chain, marketing consultancy, or event-planning group. It makes no difference if you’re a small-sized firm or a large organization. If your company has a merchant account and takes payments by credit card, then PCI...
« Older Entries
Next Entries »

Recent Posts

  • 10 Practical Ways to Use AI in Your Business
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does)
  • The Ultimate Guide to Microsoft 365 Copilot
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC 

Sign Up to Receive our Blog!

[mc4wp_form id="1096"]

Latest Articles

  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does) June 29, 2025
  • The Ultimate Guide to Microsoft 365 Copilot May 21, 2025
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness April 25, 2025
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC  March 27, 2025
  • Facebook
  • X
  • RSS

Copyright © 2025 Proactive IT. All Rights Reserved.