Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
“An Unprotected VPN Account”: The Achilles’ Heel of the Colonial Pipeline Fiasco

“An Unprotected VPN Account”: The Achilles’ Heel of the Colonial Pipeline Fiasco

by Stephen Kennen | Jun 17, 2021 | Network Security | 1 comment

Why are North Carolina gas prices close to $3.00 a gallon as I release this blog?   Some might say it’s the Colonial Pipeline ransomware attack.   Fair enough.    But based on a recently published Newsweek story, I think we can answer that question even...
Recognizing Email Fraud (Pictures of Phishing Examples)

Recognizing Email Fraud (Pictures of Phishing Examples)

by Brad Link | May 14, 2021 | Network Security, Tech Tips | 1 comment

Phishing emails are as predictable as the sunrise.   If I received a dollar for every fraudulent message forwarded to our team, I’d have more cash than Bill Gates.   Joking aside, I don’t foresee attacks slowing down for the businesses we serve. According to the FBI,...
Don’t Let the Headlines Scare You. You Can Prevent Ransomware.

Don’t Let the Headlines Scare You. You Can Prevent Ransomware.

by Stephen Kennen | Jan 26, 2021 | Managed IT, Network Security

Don’t let the headlines scare you.   You can prevent ransomware.   Maybe you’ve watched the NC State Bar and different firms land in the news. Maybe your firm has suffered from a ransomware attack. But whatever your experience, please know that your data isn’t doomed...
LastPass Tips: How to Effectively Use Our Favorite Password Management Tool

LastPass Tips: How to Effectively Use Our Favorite Password Management Tool

by Chuck Cannon | Nov 23, 2020 | Network Security, Tech Tips

Coming up with secure and unique passwords for all your online services is no easy task. Keeping these passwords organized is an even taller order.   LastPass is a powerful way to consolidate that pile of sticky notes, unsecure Excel files, and hard-to-remember...
Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue

Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue

by Stephen Kennen | Nov 18, 2020 | Network Security

Should you pay a ransom to cybercriminals? Is this action illegal?  Before I answer that question, I will say that—legal or not—paying the bad guys is not normally a good idea.  For starters, can we really trust them to keep their word? Who says they will decrypt your...
How to Make Password Management Easy and Secure

How to Make Password Management Easy and Secure

by Brad Link | Oct 20, 2020 | Network Security, Tech Tips

Do you know what proper password management looks like?   In a nutshell, there are four best practices for keeping your passwords secure:    Each account should have a unique password.   Each password should be randomly generated.   Each password should be regularly...
« Older Entries
Next Entries »

Recent Posts

  • The Real Impact of Managed IT Services from Proactive IT on Your Business Success
  • The Profit Power of Predictable IT Spending
  • Why One-Person IT Teams Can’t Protect a Business in 2026
  • 5 Ways Proactive IT Protects Your Business When Disaster Strikes
  • 10 Practical Ways to Use AI in Your Business

Sign Up to Receive our Blog!

[mc4wp_form id="1096"]

Latest Articles

  • The Real Impact of Managed IT Services from Proactive IT on Your Business Success April 7, 2026
  • The Profit Power of Predictable IT Spending March 10, 2026
  • Why One-Person IT Teams Can’t Protect a Business in 2026 January 12, 2026
  • 5 Ways Proactive IT Protects Your Business When Disaster Strikes December 18, 2025
  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • Facebook
  • X
  • RSS

Copyright © 2026 Proactive IT. All Rights Reserved.