IT Solutions Blog

What Salesforce Reveals about the Risks of Cloud Computing
It was called “the worst service disruption in Salesforce’s history.” Yes, I’m referring to the recent Salesforce disaster that sparked over 3,000 outages and affected users across the United States according to CRN. It’s a timely reminder that there are benefits and...

The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training
It’s cliche in the IT industry, but it’s true. Your employees are your biggest vulnerability. At Proactive IT, we’re all about securing your network, encrypting your data, and making sure your endpoint protection is up-to-date. But we can’t prevent employee error....

Is Cloud Storage Data Loss Possible? According to Microsoft, Yes It Is.
Your business has done the smart thing. From internal emails to shared files, you’ve placed all your company’s essential data in the cloud. No more updates for fully hosted applications. No more security patches. And certainly no more worries about losing your data....

A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees
Their network was secure. Their data was encrypted. Their firewall was fully functioning. But that didn’t stop a sophisticated spear phishing scheme from tricking our client into forfeiting a five-figure sum. Each week my team encounters another example of...

What Is PCI Compliance? A Regulation Your Business Can’t Ignore
It doesn’t matter if your business is a restaurant chain, marketing consultancy, or event-planning group. It makes no difference if you’re a small-sized firm or a large organization. If your company has a merchant account and takes payments by credit card, then PCI...

Does Your Business Need Cyber Insurance?
If you have questions such as…
- What is cyber insurance?
- Do I need cyber insurance if I have managed IT services?
- What can I expect to pay for a policy?
…this article is for you, so keep on reading.

Understanding The North Carolina Identity Theft Act and What It Means for Your Business
The data doesn’t lie. According to the FTC’s Consumer Sentinel Network Data Book records, identity theft reports in North Carolina jumped from 9,424 in 2017 to 11,481 in 2018. In fact, if you compare the 2017 and 2018 publications, you’ll discover that North Carolina...

Does Your IT Support Partner Pay Attention to the Details?
If I have learned anything over the past 20 years serving the IT needs of small businesses, it’s that the details matter. Without a process, systems, and discipline, “managed services” aren’t managed at all. I keep encountering business owners who pay a premium...

Is Your Data Compliance Plan Strong Enough to Protect Your Business?
Data records are lost, stolen or compromised at an alarming rate. Currently, it’s estimated that there are more than 6.1 million data records lost every day, a number that averages out to more than 4,000 every single minute. While data breaches occur in businesses of...

How I Escaped a Spear-Phishing Attack
This week I received a really disturbing email. It was a spear phishing scam that contained a password I recognized. For about 10 seconds, I was really worried—which is exactly what the scammer wanted. Having my email address and a familiar password lent credibility...
Sign Up to Receive our Blog
Look No Further
Let's start a conversation today
Contact Us
6211 Carmel Rd
Suite 201
Charlotte, NC 28226
Phone: 704-464-3075
Email: info@weareproactive.com