Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
What Salesforce Reveals about the Risks of Cloud Computing

What Salesforce Reveals about the Risks of Cloud Computing

by Stephen Kennen | Jun 14, 2019 | Cloud Computing

It was called “the worst service disruption in Salesforce’s history.” Yes, I’m referring to the recent Salesforce disaster that sparked over 3,000 outages and affected users across the United States according to CRN. It’s a timely reminder that there are benefits and...
The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training

The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training

by Stephen Kennen | May 29, 2019 | Network Security

It’s cliche in the IT industry, but it’s true. Your employees are your biggest vulnerability. At Proactive IT, we’re all about securing your network, encrypting your data, and making sure your endpoint protection is up-to-date. But we can’t prevent employee error....
Is Cloud Storage Data Loss Possible? According to Microsoft, Yes It Is.

Is Cloud Storage Data Loss Possible? According to Microsoft, Yes It Is.

by Stephen Kennen | May 24, 2019 | Cloud Computing

Your business has done the smart thing. From internal emails to shared files, you’ve placed all your company’s essential data in the cloud. No more updates for fully hosted applications. No more security patches. And certainly no more worries about losing your data....
A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees

A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees

by Stephen Kennen | May 16, 2019 | Network Security

Their network was secure. Their data was encrypted. Their firewall was fully functioning.   But that didn’t stop a sophisticated spear phishing scheme from tricking our client into forfeiting a five-figure sum. Each week my team encounters another example of...
What Is PCI Compliance? A Regulation Your Business Can’t Ignore

What Is PCI Compliance? A Regulation Your Business Can’t Ignore

by Stephen Kennen | Apr 22, 2019 | Data Compliance

It doesn’t matter if your business is a restaurant chain, marketing consultancy, or event-planning group. It makes no difference if you’re a small-sized firm or a large organization. If your company has a merchant account and takes payments by credit card, then PCI...
« Older Entries
Next Entries »

Recent Posts

  • The Real Impact of Managed IT Services from Proactive IT on Your Business Success
  • The Profit Power of Predictable IT Spending
  • Why One-Person IT Teams Can’t Protect a Business in 2026
  • 5 Ways Proactive IT Protects Your Business When Disaster Strikes
  • 10 Practical Ways to Use AI in Your Business

Sign Up to Receive our Blog!

[mc4wp_form id="1096"]

Latest Articles

  • The Real Impact of Managed IT Services from Proactive IT on Your Business Success April 7, 2026
  • The Profit Power of Predictable IT Spending March 10, 2026
  • Why One-Person IT Teams Can’t Protect a Business in 2026 January 12, 2026
  • 5 Ways Proactive IT Protects Your Business When Disaster Strikes December 18, 2025
  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • Facebook
  • X
  • RSS

Copyright © 2026 Proactive IT. All Rights Reserved.