Progressive Computer Systems, Inc.
Call us: (919) 929-3080
  • Home
  • About Us
    • Our Team
      • Under Attack! – Book Release
    • Awards
    • Community Involvement
    • Referral Program
    • Testimonials
    • Join Our Team
      • Job Postings
  • Services
    • Complete List
    • Managed Services
      • ProgressiveCARE Managed Services
    • Cybersecurity
    • HIPAA Compliance
    • Cloud Services
    • IT Consulting
    • Email & SPAM Protection
    • Cabling & Internet Services
    • IT Outsourcing
  • Solutions
    • Strategic Planning
    • Business Continuity
    • IT Infrastructure
      • Why Use Progressive?
    • Network Security
      • Security Concerns
    • Virtualization
    • Business Assessments
    • Unified Communications
    • Hardware & Software
      • Recommended Equipment
  • Partners
  • Industries
    • Life Sciences
    • Health Care
    • Professional Services
    • Government & Education
    • Non-Profit
  • Resources
    • Professional Network
    • Under Attack! with Lisa Mitchell – Book Release
    • Newsletter Archive
  • Contact Us
    • Referral Form
  • Portal
    • Client Portal Login
    • Online Payment
Search the site...

The Physical Side of Security

Posted by Margaret - April 11, 2019 - Cybersecurity, Data Security, IT, Managed Services, Uncategorized

Being security aware doesn’t just mean being aware of suspicious links and cyber activities – it also means paying attention to physical situations. Here are three scenarios in the tangible world to keep in mind. 1) Should that door be open? Don’t let secured areas remain unlocked. If you have access to a secured area, don’t […]

Read More

5 Steps to Maximize Resources with IT Services

Posted by Margaret - March 28, 2019 - IT, Managed Services, Uncategorized

Of all the professions in this world, you’d be hard-pressed to find one with a more pervasive DIY spirit than IT. From cobbling together your first network of 300+ machines to tapping into your first private cloud deployment, there’s a unique satisfaction brought about when you build it yourself. That said, IT outsourcing services shouldn’t […]

Read More

Phishing Identification Checklist

Posted by Margaret - February 28, 2019 - Cybersecurity, Data Security, End User Security Awareness Training, End User Security Training, Phishing, Uncategorized

Phishing attempts work when they gain your trust and make you act emotionally. For example, if an email looks like it comes from your bank, you are likely to recognize it and trust it. If it says you need to take immediate action to avoid penalties, you may be alarmed and act immediately, clicking on […]

Read More
  • 1
  • 2
  • 3
  • ›
  • »

YOURS FREE!

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Healthcare & Data Security chapter from the Bestseller, "Under Attack!"

Sign Up Now

Under Attack!

Now Available on AMAZON!

Recent Posts

Click here to view our recent posts.

Archives

Subscribe to Our Blog via Email

  • (919) 929-3080
  • (919) 929-3087
  • PCSsales@pc-net.com
  • PCSsupport@pc-net.com
  • Contact Us
    • Linkedin
    • Twitter
    • Facebook
Mailing address:
Progressive Computer Systems
615 Eastowne Drive
Chapel Hill, NC 27514
Directions

YOURS FREE !

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Under Attack! Book Chapter.
Sign Up Now for Your Free Chapter

HP Virtualization

© 2020 Progressive Computer Systems