Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020

by Stephen Kennen | Jan 7, 2020 | Managed IT, Network Security

Dear Clients and Colleagues,  I’ve been talking about cybersecurity. A lot.  If you thought we turned up the volume on cybersecurity-focused content and education in 2019, your observation was correct—we did.   In 2020, our message isn’t changing....
Why Your Business Needs a Cyber Breach Response Plan

Why Your Business Needs a Cyber Breach Response Plan

by Stephen Kennen | Oct 29, 2019 | Network Security

71 days. This is the median time that a cybersecurity breach went undetected by organizations in North, Central, and South America according to FireEye. This is known as dwell time, which FireEye defines as the following:   Dwell time is calculated as the...
The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath

by Stephen Kennen | Oct 15, 2019 | Business Continuity, Network Security

It should be surprising, but it’s not.  If you haven’t heard yet, the North Carolina State Bar was hit by a ransomware attack.  Our State Bar announced on Thursday, October 3 that (on September 30) ransomware had infected the Bar’s servers. According to the...
The Silent Bad Actor: Why Typical Solutions for Cyberattacks Aren’t Enough

The Silent Bad Actor: Why Typical Solutions for Cyberattacks Aren’t Enough

by Stephen Kennen | Jul 12, 2019 | Network Security

The year is 1204.¹   A castle named Château Gaillard is under siege by Philip II of France.² Despite being “the strongest castle of its age” (according to the Encyclopaedia Britannica), the fortress falls into the hands of the enemy.³ Just how did it...
The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training

The Case for Human Firewalls: 3 Reasons You Need Employee Cybersecurity Training

by Stephen Kennen | May 29, 2019 | Network Security

It’s cliche in the IT industry, but it’s true. Your employees are your biggest vulnerability. At Proactive IT, we’re all about securing your network, encrypting your data, and making sure your endpoint protection is up-to-date. But we can’t prevent employee error....
A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees

A Real-Life Spear Phishing Example: 7 Takeaways to Educate Your Employees

by Stephen Kennen | May 16, 2019 | Network Security

Their network was secure. Their data was encrypted. Their firewall was fully functioning.   But that didn’t stop a sophisticated spear phishing scheme from tricking our client into forfeiting a five-figure sum. Each week my team encounters another example of...
« Older Entries
Next Entries »

Recent Posts

  • 10 Practical Ways to Use AI in Your Business
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does)
  • The Ultimate Guide to Microsoft 365 Copilot
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC 

Sign Up to Receive our Blog!

Latest Articles

  • 10 Practical Ways to Use AI in Your Business July 17, 2025
  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does) June 29, 2025
  • The Ultimate Guide to Microsoft 365 Copilot May 21, 2025
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness April 25, 2025
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC  March 27, 2025
  • Facebook
  • X
  • RSS

Copyright © 2025 Proactive IT. All Rights Reserved.