Progressive Computer Systems, Inc.
Call us: (919) 929-3080
  • Home
  • About Us
    • Our Team
      • Under Attack! – Book Release
    • Awards
    • Community Involvement
    • Referral Program
    • Testimonials
    • Join Our Team
      • Job Postings
  • Services
    • Complete List
    • Managed Services
      • ProgressiveCARE Managed Services
    • Cybersecurity
    • HIPAA Compliance
    • Cloud Services
    • IT Consulting
    • Email & SPAM Protection
    • Cabling & Internet Services
    • IT Outsourcing
  • Solutions
    • Strategic Planning
    • Business Continuity
    • IT Infrastructure
      • Why Use Progressive?
    • Network Security
      • Security Concerns
    • Virtualization
    • Business Assessments
    • Unified Communications
    • Hardware & Software
      • Recommended Equipment
  • Partners
  • Industries
    • Life Sciences
    • Health Care
    • Professional Services
    • Government & Education
    • Non-Profit
  • Resources
    • Professional Network
    • Under Attack! with Lisa Mitchell – Book Release
    • Newsletter Archive
  • Contact Us
    • Referral Form
  • Portal
    • Client Portal Login
    • Online Payment
Search the site...

What is a rootkit? And how to stop them

Posted by Taylor Wall - July 18, 2019 - Cybersecurity, Data Security, End User Security Training, Information Technology, IT, Malware, Managed Services

used with permission from Norton by Symantecby Dan Rafter Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits are a type of malware that are designed so that they can […]

Read More

Ransomware Attacks Take Down County Government Offices Time and Time Again

Posted by Taylor Wall - May 13, 2019 - Cybersecurity, Data Breach, Data Security, End User Security Awareness Training, End User Security Training, IT, Malware, Managed Services, Phishing

It seems like government offices aren’t learning their lesson, with ransomware attacks continuing to impact operations and cost time and money to recover. A string of unrelated ransomware attacks have plagued county offices in recent months. Last month, the Ryuk strain of ransomware took out the email services of a county in Georgia costing them a […]

Read More

Phishing Identification Checklist

Posted by Margaret - February 28, 2019 - Cybersecurity, Data Security, End User Security Awareness Training, End User Security Training, Phishing, Uncategorized

Phishing attempts work when they gain your trust and make you act emotionally. For example, if an email looks like it comes from your bank, you are likely to recognize it and trust it. If it says you need to take immediate action to avoid penalties, you may be alarmed and act immediately, clicking on […]

Read More
  • 1
  • 2
  • 3
  • 4

YOURS FREE!

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Healthcare & Data Security chapter from the Bestseller, "Under Attack!"

Sign Up Now

Under Attack!

Now Available on AMAZON!

Recent Posts

Click here to view our recent posts.

Archives

Subscribe to Our Blog via Email

  • (919) 929-3080
  • (919) 929-3087
  • PCSsales@pc-net.com
  • PCSsupport@pc-net.com
  • Contact Us
    • Linkedin
    • Twitter
    • Facebook
Mailing address:
Progressive Computer Systems
615 Eastowne Drive
Chapel Hill, NC 27514
Directions

YOURS FREE !

The 7 Most Critical IT Security Protections Every Business Must Have In Place. PLUS: Under Attack! Book Chapter.
Sign Up Now for Your Free Chapter

HP Virtualization

© 2020 Progressive Computer Systems