Information Technology

March 4, 2022

How secure are your passwords?

Partek manages over 4,000 passwords for over 500 organizations through our asset management tools. Keeping access to our client’s critical assets secure and maintained. Every year, […]
February 14, 2022

Why every business should own a domain name

First off, what is a domain name? In layman’s terms: A domain name is the address for a website. Just like a physical address helps people […]
January 24, 2022

CISA urges organizations to strengthen their cybersecurity defenses

Last week, at least fifteen Ukrainian public institutions and government agencies’ websites were hacked and defaced by a new malware family Microsoft calls ‘WhisperGate’. Microsoft warns […]
October 10, 2021

How hackers use phishing emails in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and […]
October 6, 2021

Windows 11 – What you need to know

Windows 11 releases on October 5th. Given that Windows 10 was already pretty polished when it launched, and only got better over time, why the need […]
September 26, 2021

Are you at risk for a Cyber Attack?

6 best practices to secure your business You can’t go long without seeing another headline about a cyber-security breach impacting a high-profile company. In recent years, […]
July 17, 2021

Small / medium sized businesses are the most vulnerable to ransomware right now

For as much media attention ransomware is getting with large-scale cyber-attacks, it appears that many small and medium-sized businesses (SMBs) have failed to embrace the idea […]
March 10, 2021

Phishing Emails Related to COVID-19 Vaccines on the Rise

Phishing campaigns that use the COVID-19 vaccination as bait are becoming more popular in recent months. In the same way that a year ago threat actors […]
December 29, 2020

5 Misconceptions about Cybersecurity and your Business

Cybersecurity is one of the hardest variables to control as an IT provider in a business environment, as user error becomes more prevalent across businesses everywhere. […]
December 1, 2020

What is Business Email Compromise (BEC)?

And why should I be worried about this? Business email compromise (BEC), sometimes known as email account compromise (EAC), is one of the most financially damaging […]
October 19, 2020

New Ransomware Variant Disguises itself as “Windows Update” attachment

Important Security Update: A well-known variant of Ransomware known as the ‘Emotet botnet‘ has changed the way it’s distributing its payload. Recent reports from the Cyber-security […]
October 5, 2020

Microsoft ends support for Office 2010: October 13th

There are still a significant amount of Office 2010 users out there, specifically within companies. As recently as 2017, according to a survey published by IT […]