Pink Hat Technology Management

Blog

What is a Mobile Hotspot? And Why Do You Need One?

If you’re wondering why you need a mobile hotspot for your enterprise, consider these numbers. According to the Ericcson Mobility Report published in June, ...

Stolen Uber accounts worth more than stolen credit cards

Cybercriminals don't care that much about your credit card number anymore. Uber, PayPal and even Netflix accounts have become much more valuable to criminals, ...

Second Quarter 2017 Top-Clicked Phishing Tests (by KnowBe4)

KnowBe4, Pink Hat’s partner, and the world’s most popular platform for simulated phishing attacks, reports quarterly on the latest top-clicked phishing email subjects so you know what the highest-risk fake emails are. That way you help your last line of defense, ...

So, What's The Difference Between Disaster Recovery and Business Continuity, And Why Should You Care?

Face it—downtime is depressing, difficult and downright dumb. You can’t afford to lose business, customers and your reputation because of failed computer systems. That’s why it’s so important to pay attention to Disaster Recovery (DR) and Business Continuity (BC). Almost ...

Think you can just buy cyber liability insurance and be covered? Think again. 

by Joy Beland and KnowBe4. The WanaCry ransomworm has caused insurance companies really to take notice.  Customers have started to file damage claims, however ...

Security Awareness Training Can Lower Your Cyberinsurance Premium

How? Call your cybersecurity insurance carrier or agent and specifically ask if you get a discount on the premium if you step ...

Do you have more and more people bringing MacBooks to your office?

Macs absolutely need virus and malware protection just like PCs, AND they need to be updated regularly or you’re making your network vulnerable. Our ...

How do you know if someone has stolen your website login credentials?

We found it.  An awesomely powerful Dark Web filtering service that allows us to see if any credentials from any websites have ...

'Petya' ransomware attack: WHAT IS WRONG WITH THIS HEADLINE?

Petya is bigger than “WannaCry,” but it’s way more lethal – because, IT’S NOT RANSOMWARE.  It promises recovery of files for Bitcoin, but the bad guys are not releasing encryption keys ...

Absolute Beginner Google Analytics Tips for Small Businesses

Analytics is a field where it’s really easy (and sometimes fun!) to get ‘lost in the weeds’ over code, best practices, implementation ...

Contact

Pink Hat Technology Management

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • RSS