April 2024

  • Be Careful When Scanning QR Codes
  • What Is Microsoft Security Copilot
  • Smart Tactics To Reduce Cloud Waste
  • Core Values

March 2024

  • Are Your Smart Home Devices Spying On You?
  • Repercussions Of A Data Breach
  • The Dangers of Browser Extensions

February 2024

  • Gamers Beware of Hackers!
  • Top Data Breaches of 2023
  • The Tangible Value of Cybersecurity

January 2024

  • New SEC Cybersecurity Requirements
  • Leverage New MS Teams Payment App
  • Emerging Technology Threats

December 2023

  • Organize Your Cybersecurity Strategy
  • Smart Home Tech to Avoid and Adopt
  • Most Secure Way to Share Passwords with Employees
  • Incorporate Generative AI

November 2023

  • Watch Out for Ransomware Pretending to Be a Windows Update!
  • Smart Home Safety Tips
  • Biggest Cybersecurity Mistakes
  • Secure by Design" Cybersecurity Practices

October 2023

  • "Cybersecurity Skeletons" in the Closet
  • What is SaaS Ransomware?
  • 9 Reasons to Use Airplane Mode
  • Learning Essential Cyber Hygiene

September 2023

  • Spot Fake LinkedIn Sales Bots
  • Have You Tried Microsoft Designer?
  • Tech Trends to Fuel Your Growth
  • What Should You Expect in the New iOS 17?

August 2023

  • What is Zero-Click Malware?
  • Common Tech Myths
  • 7 Cybersecurity Risks of Remote Work
  • 7 Advantages of a Defense-in-Depth Cybersecurity Strategy

July 2023

  • Is Your Online Shopping App Invading Your Privacy?
  • How Microsoft 365 Copilot Is Going to Transform M365 Apps
  • Fight Business Email Compromise
  • 10 Helpful Tips for Small Businesses

June 2023

  • Is It Time to Ditch the Passwords for More Secure Passkeys?
  • Create Dashboards in Power Bi
  • What Is Push-Bombing?
  • How to Use ChatGPT at Your Business Responsibly

May 2023

  • Why App Fatigue is a Security Issue
  • Virtual Appointments in Microsoft Teams
  • Everyday Objects Can Steal Your Identity
  • Technologies to Give You an Advantage

April 2023

  • Data Backup Is Not Enough
  • Microsoft Forms
  • Think Twice Before Using Self-Portrait Apps
  • Vulnerability Management for Your Tech

March 2023

  • Should you spy on your Team?
  • Scam texts from your CEO
  • Mitigating Data Breach Costs
  • Stop Online Banking Fraud

February 2023

  • How Is the Metaverse Going to Change Business?
  • Mobile Malware on The Rise
  • Trends in Data Privacy
  • Have You Had Data Exposed in a Recent Data Breach

January 2023

  • What's Changing In The Cybersecurity Insurance Market?
  • Align Your Team To Company Targets With Microsoft Viva Goals
  • What Cybersecurity Attack Trends Should You Watch Out For In 2023?
  • 7 VoIP Setup Tips For A More Productive Office

December 2022

  • How Preferred IT Group Saved Christmas
  • How Has Technology Changed Holiday Traditions?
  • Our CEO Is A Published Author
  • 10 Cybersecurity Tips For The Holiday Season

November 2022

  • Dropbox Suffers Major Breach In Phishing Attack
  • IT Professional Say Business VPN Attacks Are On The Rise
  • Our CEO Is A Published Author
  • Socktober Success!

October 2022

  • October Is Cybersecurity Awareness Month
  • Spooky Technologies That Exist Today
  • Our CEO Is A Published Author
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

September 2022

  • Tesla Owner Implants Chip In Hand To Unlock, Start Car
  • A High Severity TikTok Vulnerability Allowed One-click Account Hijacking
  • Our CEO Is A Published Author
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

August 2022

  • Teaching Cybersecurity Education At Home
  • 5 Modern Technologies ‘The Jetsons’ Accurately Predicted 60 Years Ago
  • Our CEO Is A Published Author
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

July 2022

  • How Old Is Google? History Of The World’s Most Popular Search Engine
  • Make Sure You’re Not Ignoring The Biggest Cybersecurity Threats
  • Our CEO Is A Published Author
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

June 2022

  • Researchers Reveal ‘Follina’ Zero-Day Vulnerability In Microsoft Office
  • Ways To Clean Up Social Media
  • Our CEO Is A Published Author
  • Welcome Back Gabe!
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

May 2022

  • 7 Reasons You Need An Incident Response Plan
  • Why Multi-Factor Authentication (MFA) Is Important
  • Our CEO Is A Published Author
  • Employee Spotlight: Sully Horne
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

April 2022

  • Windows 11 Gets A New Desktop Watermark On Unsupported Hardware
  • What Is Smishing And How To Defend Against It?
  • Our CEO Is A Published Author
  • Meet Caleb Harter
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

March 2022

  • Luck Is For Leprechauns! Make Sure Your Data Is Safe.
  • Microsoft Accounts Targeted By Russian-Themed Credential Harvesting
  • Our CEO Is A Published Author
  • Meet Matt Smith
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

February 2022

  • Romance Scams Ahead of Valentine’s Day
  • 5 Tips To avoid Being Scammed When Using A Payment App
  • Our CEO Is A Published Author
  • Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast

January 2022

  • Technology Resolutions for 2022
  • 5 Cybersecurity Trends To Watch In 2022
  • Our CEO Is A Published Author
  • Meet Jeremy!
  • PITG Holiday Party

December 2021

  • The Snow Filled The Magical Night...
  • Top Holiday Scams To Watch Out For This Holiday Season
  • Holly is Back!
  • We Love Our Interns
  • Meet Garrett

November 2021

  • Technology To Be Thankful For
  • Pegasus Spyware Group Blacklisted By The US Government
  • Our CEO Is A Published Author
  • Socktober Success!
  • Annual Halloween Costume Contest

Octorber 2021

  • 7 Spooky Scam Calls
  • Cyber Lessons: Arm Yourself With Knowledge To Stay Ahead Of The Game
  • Our CEO Is A Published Author
  • Socktober Is Here!
  • Three Cheers For 7 Years!

September 2021

  • Is Your Business Protected With Cyber Liability Insurance?
  • Nigerian Threat Actors Solicit Employees to
    Deploy Ransomware for Cut of Profits
  • Our CEO Is A Published Author
  • Happy Birthday Christopher!
  • Advantages To A Dog Friendly Workplace

August 2021

  • Tokyo’s Olympic Medals Are Made Entirely From Recycled Gadgets
  • Federal Cybersecurity Defenses Not Strong Enough to Protect American Data
  • Our CEO Is A Published Author
  • Happy Birthday Amy and Carter!!
  • Federal Cybersecurity Defenses - Continued

July 2021

  • Windows 11 - The Good, The Meh, The Ugly
  • Summer Scams AndHow To Avoid Them
  • Our CEO Is A Published Author
  • Why It’s Easy For Hackers To Hack
  • Sully on Vacation!

June 2021

  • Inside the Amazon Warehouse - Humans and Machines Working Together
  • Ransomware As A Service
  • Our CEO Is A Published Author
  • PITG Birthday Boys

May 2021

  • The Global Chip Shortage Is Starting To Have Major Real-world Consequences
  • US Passes Emergency Waiver Over Fuel Pipeline Cyber-attack
  • May The 4thBe With You
  • The Great American Cleanup

April 2021

  • New Cyberthreats Remind Us OfThe Need For Hyper-vigilance
  • What Is BusinessContinuity And WhyIs It Important?
  • Top Technology Trend for 2021 - Internet of Things (IoT)

March 2021

  • Just Because You’ve Been LUCKY EnoughTo Avoid A Cyber-Attck Doesn’t MeanYou’re Not At Risk
  • New Wearable DeviceTurns Your Body Into ABiological Battery
  • 7 Surprising Facts AboutSt. Patrick’s Day

February 2021

  • Valentine’s DayPhishing Attacks
  • 11 Tips ForDitchingDoomscrolling
  • If you use any of these Chrome extensions, delete them right now!

January 2021

  • Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code
  • Adobe Flash Player is Finally Laid to Rest
  • PITG Ugly Christmas Sweater Contest

December 2020

  • The Snow Filled The Magical Night...
  • Top HolidayScams in 2020

  • Holly is Back!

November 2020

  • Backup and DistaterRecovery can helpyou feel verythankful indeed!
  • 5 Online Shopping Tips To Stay Safe This Holiday Season

  • Preferred IT Group’s Annual Halloween Costume Contest

October 2020

  • How Is Wearable Technology Changing Halloween?
  • Your Computer Network Is Being Haunted

  • BEFORE THE BREACH

September 2020

  • If it sems too good to be true, it's most likely a scam.

  • Why Your IT Disaster Recovery Plan Should Be A Top Priority

  • BEFORE THE BREACH

August 2020

  • Every kid is unique and it’s important to find out what works best for your child.

  • Why Your IT Disaster Recovery Plan Should Be A Top Priority

  • BEFORE THE BREACH

July 2020

  • SurveyMonkey Phishing Scam

  • Technology Trends ForThe Next Decade

  • BEFORE THE BREACH

June 2020

  • The History of Emojis

  • 6 Signs Your Computer is Infected With a Virus

  • BEFORE THE BREACH

April 2020

  • Five ways to thrive while working from home during the coronavirus pandemic

  • Coronavirus stimulus scams are here. How to identify these new online and text attacks

  • BEFORE THE BREACH

March 2020

  • Shark Tank Star Barbara Corcoran Loses Almost $400,000 in Email Scam

  • Coronavirus Scammers Are Seeking to Profit Off the Deadly Virus

  • BEFORE THE BREACH

February 2020

  • FBI Warns of New Online Threat to Personal Credit Card Information
  • Big Microsoft Data Breach 250 Million Records Exposed
  • Hackers Are Here! New Skills For A New Fight

January 2020

  • Proactively consider tools to detect anomalous behavior, automatically remidiate, and segment threats
  • Top Data Breaches of 2019
  • Hackers Are Here! New Skills For A New Fight

December 2019

  • Merry Christmas to all, and to all a good night!
  • 12 SCAMS OF CHRISTMAS
  • Hackers Are Here! New Skills For A New Fight

November 2019

  • Why third-party remote access is the biggest security threat to networks
  • Attackers Hide Behind Trusted Domains, HTTPS
  • Hackers Are Here! New Skills For A New Fight

October 2019

  • Don’t Fall Victim To This Scam! They Count On You Acting Quickly Without Thinking It Through
  • Urgent Warning: Netflix Phishing Scam
  • Socktober is here and we need your help!

September 2019

  • Implementing An Effective Cybersecurity Strategy Is Critical
  • Multifactor Authentication And Why It Is So Important
  • Before The Breach: Hackers Are Here! New Skills For A New Fight

August 2019

  • Being A Hacker Is Almost A Dirty Word
  • Louisiana Declares State Of Emergecy After Ransomware Attack
  • Before The Breach: Hackers Are Here! New Skills For A New Fight

July 2019

  • Nsa Cybersecurity Advisory: Patch Remote Desktop On Legacy Versions Of Windows
  • Does Your Business Have A Disaster Recovery Plan
  • Before The Breach: Hackers Are Here! New Skills For A New Fight

June 2019

  • 5 Ways To Spot Fake Emails And Stay Safe
  • Spooked About Your Network’s Security?
  • Before The Breach: Hackers Are Here! New Skills For A New Fight

May 2019

  • URGENT WARNING FOR BUSINESSES RUNNING
  • 5G Then, Now, and Tomorrow
  • BEFORE THE BREACH

April 2019

  • 4 DEADLY MISTAKES YOU’RE MAKING WITH IT SECURITY
  • Better to stay one step ahead with an MSP by your side.
  • Top Tips To Prevent Cybercriminals From Hacking Your Network

March 2019

  • 3 IT INVESTMENTS YOU SHOULD NEVER SKIMP ON
  • Does Your Business Have a Disaster Recovery Plan?
  • 3 Ways Your Employees Will Invite Hackers Into Your Network

February 2019

  • Costs of Band-Aid Solutions
  • 9 Things Your Kid Can Teach You About Internet Security
  • Real Ransomware Statistics for 2019

January 2019

  • 3 Fatal Errors when Hiring Computer Support
  • 90 Ways to Be Better This Year
  • Tips for Staying Secure Against Ransomware

December 2018

  • The Importance of a Human Firewall
  • Cybercrime Refresher
  • The Dangers of Low Security Awareness

November 2018

  • Prevent Cyber Crime: What Not to Do
  • Does Your Business Have a Disaster Recovery Plan
  • 6 Office Security Tips

October 2018

  • Critical cloud computing facts
  • Lessons from the coach's playbook
  • Ransomware prevention tips

September 2018

  • Scary emails you should never open
  • Using social media like a pro
  • Types of cybercrime

August 2018

  • Preparing your small business for tornado season
  • Daily habits that are killing your work-life balance
  • A company policy on cybersecurity

July 2018

  • How to identify cyber threats and prevent them
  • Entrepreneurial advice to shorten the learning curve
  • 6 tricks to help avoid phishing attacks

June 2018

  • 3 IT investments you should never skimp on
  • 3 big business trends
  • Your data is safer in the cloud

May 2018

  • Is your cyberprotection up to date?
  • A brief history of internet security
  • Why is two-factor authentication important?

April 2018

  • What is a business continuity plan?
  • Keep your best employees from leaving
  • How your company's data is being leaked online

March 2018

  • The dangers of human error
  • Benefits of a hybrid cloud solution
  • Answer these questions about cybercrime

February 2018

  • Who's the biggest target for a cybercriminal?
  • 9 apps you should download today
  • Protect yourself from Spectre and Meltdown

January 2018

  • Don't hire inexperienced "professionals"
  • Run your meetings like a CEO
  • Prevent hackers from stealing your phone data