Progressive Computer Systems, Inc.
Call us: (919) 929-3080
  • Home
  • About Us
    • Our Team
      • Under Attack! – Book Release
    • Awards
    • Community Involvement
    • Referral Program
    • Testimonials
    • Join Our Team
      • Job Postings
  • Services
    • Complete List
    • Managed Services
      • ProgressiveCARE Managed Services
    • Cybersecurity
    • HIPAA Compliance
    • Cloud Services
    • IT Consulting
    • Email & SPAM Protection
    • Cabling & Internet Services
    • IT Outsourcing
  • Solutions
    • Strategic Planning
    • Business Continuity
    • IT Infrastructure
      • Why Use Progressive?
    • Network Security
      • Security Concerns
    • Virtualization
    • Business Assessments
    • Unified Communications
    • Hardware & Software
      • Recommended Equipment
  • Partners
  • Industries
    • Life Sciences
    • Health Care
    • Professional Services
    • Government & Education
    • Non-Profit
  • Resources
    • Professional Network
    • Under Attack! with Lisa Mitchell – Book Release
    • Newsletter Archive
  • Contact Us
    • Referral Form
  • Portal
    • Client Portal Login
    • Online Payment
Search the site...

Keep Your Devices and Data Safe Using These Simple Security Best Practices

Posted by Sherry McCullough - May 23, 2019 - Cybersecurity, Data Security, End User Security Awareness Training, IT, Managed Services, Uncategorized

used with permission from Windows Blog by Steve Clarke Ransomware, botnets and phishing scams were at an all-time high in 2018 and attackers are taking every opportunity to steal data for their own gain. In 2018 alone, Microsoftfound that “More than 75 percent of phishing mails include malicious URLs to phishing sites. Other variations include malicious […]

Read More

How to Protect Against Phishing

Posted by Sherry McCullough - September 28, 2016 - Cybersecurity, Phishing, Uncategorized

Phishing is an online con game, and phishers are nothing more than tech-savvy con artists. In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft. Phishers use a variety of sophisticated devices […]

Read More

Maintaining mobile safety on your smartphone

Posted by Sherry McCullough - September 21, 2016 - Cybersecurity, Mobile Device, Uncategorized

Our phones play an integral part in both our everyday and business lives. But as more of us use these portable wonders, the potential for more problems increases as well. Because cybercriminals are actively targeting mobile devices that lack sufficient protection,  keeping your smartphone safe is extremely important. This includes protecting both your software and […]

Read More
  • 1
  • 2
  • 3
  • ›
  • »

YOURS FREE!

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Healthcare & Data Security chapter from the Bestseller, "Under Attack!"

Sign Up Now

Under Attack!

Now Available on AMAZON!

Recent Posts

Click here to view our recent posts.

Archives

Subscribe to Our Blog via Email

  • (919) 929-3080
  • (919) 929-3087
  • PCSsales@pc-net.com
  • PCSsupport@pc-net.com
  • Contact Us
    • Linkedin
    • Twitter
    • Facebook
Mailing address:
Progressive Computer Systems
615 Eastowne Drive
Chapel Hill, NC 27514
Directions

YOURS FREE !

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Under Attack! Book Chapter.
Sign Up Now for Your Free Chapter

HP Virtualization

© 2020 Progressive Computer Systems