IT Solutions Blog
How to Respond to a Security Breach: A Senior Network Engineer Explains
From the recent Robinhood incident to the Colonial Pipeline disaster, security compromises happen. Even with cybersecurity measures, your business can still experience loss. (For an example of what I’m talking about, read what happened to our client here.) Are...
What to Do after a Cyberattack: A Panel Discussion on Cyber Insurance and Incident Response
"Should my business purchase cyber insurance?" "If I have cyber insurance, what should I do after a breach?" "What’s the role of my IT provider after an incident?" If you have questions like these, be sure to watch this webinar where David Short, Patrick O'Brien,...
10 Takeaways from My Conversation with CISA and the NCSA on Ransomware
Last month, I participated in a panel discussion hosted by the National Cyber Security Alliance (NCSA). The topic of the day? Ransomware. Domingo Rivera from the Cybersecurity and Infrastructure Security Agency (CISA) and I had a great conversation. And...
Your Backup Software Probably Isn’t Providing What You Need. Here’s How to Know…
Your backup software probably isn’t providing what you need. I know that’s a strong statement. But it’s rooted in reality. Too many companies think that their data is safe because they're using a backup tool. But their data is actually in peril, which could...
5 Signs You Should Expect More from Your Managed Service Provider
Are you expecting enough from your managed service provider? Or—like the proverbial frog in the kettle—have you slowly grown accustomed to your business being neglected, disrupted, or even mistreated? In my opinion, some companies don’t have the...
“An Unprotected VPN Account”: The Achilles’ Heel of the Colonial Pipeline Fiasco
Why are North Carolina gas prices close to $3.00 a gallon as I release this blog? Some might say it’s the Colonial Pipeline ransomware attack. Fair enough. But based on a recently published Newsweek story, I think we can answer that question even...
Recognizing Email Fraud (Pictures of Phishing Examples)
Phishing emails are as predictable as the sunrise. If I received a dollar for every fraudulent message forwarded to our team, I’d have more cash than Bill Gates. Joking aside, I don’t foresee attacks slowing down for the businesses we serve. According to the FBI,...
HattonTech Has Joined the Proactive IT Family
We’re thrilled to announce that HattonTech has officially joined forces with Proactive IT! It’s a partnership that we’re very excited about, and it’s going to be a big step forward for all of our clients. The story starts all the way back in 2001 when Tim Hatton...
Does Your IT Company Support Your Overall Business Strategy?
What kind of support do you get from your IT company? Are you paying top-tier prices but only receiving helpdesk assistance and routine antivirus management? Instead of seeing the big picture, is your vendor reactive and focused on short-term solutions? Your IT...
Are You Trapped in a Toxic Business Relationship with Your IT Company?
Are you trapped in a toxic business relationship with your current IT company? If you are, you’re not alone. This is a very real problem. Some IT providers are simply incompetent. The owners of these organizations may be good people, but they don’t know what...
Look No Further
Let's start a conversation today
Contact Us
6211 Carmel Rd
Suite 201
Charlotte, NC 28226
Phone: 704-464-3075
Email: info@weareproactive.com
