Request a Free Consultation» 704-464-3075
Proactive IT
  • Home
  • Our Services
    • Managed IT Services
    • Disaster Recovery
    • Data Protection
    • Network Security
    • Cloud Services
    • IT Compliance
    • IT Support
  • Work with Us
  • Blog
  • About Us
  • Contact Us
  • Get Help Now
Select Page
Five Steps to Protect Your Business from Spyware

Five Steps to Protect Your Business from Spyware

by Steve Kennen | Dec 1, 2024 | Business Continuity, Network Security

Spyware is more than just a buzzword – it’s a serious and growing cybersecurity threat. Even tech giants like Google are sounding the alarm, warning about the “real-world harm” it can cause. But what is spyware exactly, and how can you protect your business from...
The CrowdStrike outage explained for Charlotte business owners and managers

The CrowdStrike outage explained for Charlotte business owners and managers

by Steve Kennen | Jul 24, 2024 | Business Continuity, Network Security

On Friday July 19, 2024, a routine software update from CrowdStrike, a leading cyber security company, caused a major issue affecting an estimated 8.5 million Windows computers. Proactive IT does not use CrowdStrike software, so our customer networks were not...
Client Update: Our Solution to Recent Microsoft 365 Phishing Attacks

Client Update: Our Solution to Recent Microsoft 365 Phishing Attacks

by Ricky Haase | May 7, 2024 | Network Security

As described in a previous blog post, we have observed a concerning increase in successful phishing attacks against Microsoft 365 accounts that have MFA enabled and enforced. We have invested heavily in researching available options that will mitigate the risks posed...
Phishing Attacks Are Becoming More Sophisticated: Here’s What You Need to Know

Phishing Attacks Are Becoming More Sophisticated: Here’s What You Need to Know

by Ricky Haase | Feb 22, 2024 | Network Security

We’ve observed a concerning rise in successful phishing attacks leading to compromised email accounts. Quite simply, the bad guys are getting more and more sophisticated. To protect your organization, it is important that you remain informed and vigilant. Here’s...
January 2024 Security Advisory: Watch for This Social Phishing Scam 

January 2024 Security Advisory: Watch for This Social Phishing Scam 

by Steve Kennen | Jan 23, 2024 | Network Security

Last week, one of our clients experienced an interesting phishing scam. Our client was not the “target” – in fact, the scam targeted job applicants seeking a position at our client’s company. And the scam was perpetrated using publicly-available information – no...
It’s time to say goodbye to traditional passwords

It’s time to say goodbye to traditional passwords

by Steve Kennen | Nov 16, 2023 | Network Security

Did you ever imagine a world where the lengthy, complicated passwords people often forget would become a thing of the past? It seems that day might be arriving sooner than we anticipated. Google has officially made Passkeys the default sign-in method for all personal...
« Older Entries
Next Entries »

Recent Posts

  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does)
  • The Ultimate Guide to Microsoft 365 Copilot
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC 
  • How Microsoft Windows Agent Arena is Transforming Business Productivity and Work Efficiency

Sign Up to Receive our Blog!

Latest Articles

  • How to Spot Cybersecurity Vulnerabilities in Your Business (Before Someone Else Does) May 29, 2025
  • The Ultimate Guide to Microsoft 365 Copilot April 21, 2025
  • Disaster Recovery in Charlotte: What Last Year’s CrowdStrike Outage Taught Businesses About IT Preparedness March 25, 2025
  • Cybersecurity Alert: Business Email Attacks Are on the Rise in Charlotte, NC  February 27, 2025
  • How Microsoft Windows Agent Arena is Transforming Business Productivity and Work Efficiency February 10, 2025
  • Facebook
  • X
  • RSS

Copyright © 2025 Proactive IT. All Rights Reserved.