Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
Select Page
9 North Carolina Cybersecurity Incidents That Happened in 2019

9 North Carolina Cybersecurity Incidents That Happened in 2019

by Steve Kennen | Jan 29, 2020 | Data Compliance, Network Security

In 2019, our state saw its share of cybercrime. From ransomware to malicious code, I can document at least 9 North Carolina cybersecurity incidents that happened last year. And here’s what’s sobering. This is probably the tip of the iceberg as CSO reports the...
An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

by Steve Kennen | Jan 7, 2020 | Managed IT, Network Security

Dear Clients and Colleagues,  I’ve been talking about cybersecurity. A lot.  If you thought we turned up the volume on cybersecurity-focused content and education in 2019, your observation was correct—we did.   In 2020, our message isn’t changing....
I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?

I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?

by Steve Kennen | Nov 22, 2019 | General

You got an email from Microsoft.  It’s assertive.  It’s confident.  And it’s talking about your business getting something called a Software Asset Management (SAM) engagement.  What is a Microsoft SAM engagement? And how should you respond to the...
Why Your Business Needs a Cyber Breach Response Plan

Why Your Business Needs a Cyber Breach Response Plan

by Steve Kennen | Oct 29, 2019 | Network Security

71 days. This is the median time that a cybersecurity breach went undetected by organizations in North, Central, and South America according to FireEye. This is known as dwell time, which FireEye defines as the following:   Dwell time is calculated as the...
The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

by Steve Kennen | Oct 15, 2019 | Business Continuity, Network Security

It should be surprising, but it’s not.  If you haven’t heard yet, the North Carolina State Bar was hit by a ransomware attack.  Our State Bar announced on Thursday, October 3 that (on September 30) ransomware had infected the Bar’s servers. According to the...
« Older Entries
Next Entries »

Recent Posts

  • Looking for the Best Way to Use Microsoft Teams? Here Are 5 Tips for Success
  • Don’t Let the Headlines Scare You. You Can Prevent Ransomware.
  • Tools for Working from Home: 2020 Christmas Gift Ideas from the Proactive IT Team
  • LastPass Tips: How to Effectively Use Our Favorite Password Management Tool
  • Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue

Sign Up to Receive our Blog!

Latest Articles

  • Looking for the Best Way to Use Microsoft Teams? Here Are 5 Tips for Success February 25, 2021
  • Don’t Let the Headlines Scare You. You Can Prevent Ransomware. January 26, 2021
  • Tools for Working from Home: 2020 Christmas Gift Ideas from the Proactive IT Team December 15, 2020
  • LastPass Tips: How to Effectively Use Our Favorite Password Management Tool November 23, 2020
  • Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue November 18, 2020
  • Facebook
  • Twitter
  • Google
  • RSS

Copyright © 2021 Proactive IT. All Rights Reserved.