December 2024
- Malvertising" is on the Rise!
- Cashless Revolution
- Sate of AI at Work
- Socktober Drive
November 2024
- Copilot in Teams
- Transforming Customer Service
- Enhance Your Email Security
- Halloween Costume Winner
October 2024
- Why Securing Your Software Supply Chain is Critical
- Essential Settings to Maximize your Microsoft 365 Experience
- Common Mobile Malware Traps
- Congratulations Scott Diehl
September 2024
- Windows 10: The Final Countdown
- Automation for Small Enterprises
- The True Price of IT Downtime
- Before Buying a Used Laptop
August 2024
- Tech-savvy Workspaces: How Technology Drives Office Productivity
- How Matter is Setting a New Standard
- Phishing 2.0
- AI Data Breaches are Rising! Here's How to Protect Your Company
July 2024
- Is Your Business Losing Money?
- Microsoft Copilot for Finance
- A Culture of Cyber Awareness
- Continuous Monitoring is a Cybersecurity Must
June 2024
- Don't Skip Vulnerability Assessments
- Leverage Copilot for Microsoft 365
- Adopting Zero Trust Security
- Improving Your Company's Data Management
May 2024
- Google & yahoo's New DMARC Policy
- Beware of Deepfakes
- Introducing the New Microsoft Planner
- Great American Cleanup
April 2024
- Be Careful When Scanning QR Codes
- What Is Microsoft Security Copilot
- Smart Tactics To Reduce Cloud Waste
- Core Values
March 2024
- Are Your Smart Home Devices Spying On You?
- Repercussions Of A Data Breach
- The Dangers of Browser Extensions
February 2024
- Gamers Beware of Hackers!
- Top Data Breaches of 2023
- The Tangible Value of Cybersecurity
January 2024
- New SEC Cybersecurity Requirements
- Leverage New MS Teams Payment App
- Emerging Technology Threats
December 2023
- Organize Your Cybersecurity Strategy
- Smart Home Tech to Avoid and Adopt
- Most Secure Way to Share Passwords with Employees
- Incorporate Generative AI
November 2023
- Watch Out for Ransomware Pretending to Be a Windows Update!
- Smart Home Safety Tips
- Biggest Cybersecurity Mistakes
- Secure by Design" Cybersecurity Practices
October 2023
- "Cybersecurity Skeletons" in the Closet
- What is SaaS Ransomware?
- 9 Reasons to Use Airplane Mode
- Learning Essential Cyber Hygiene
September 2023
- Spot Fake LinkedIn Sales Bots
- Have You Tried Microsoft Designer?
- Tech Trends to Fuel Your Growth
- What Should You Expect in the New iOS 17?
August 2023
- What is Zero-Click Malware?
- Common Tech Myths
- 7 Cybersecurity Risks of Remote Work
- 7 Advantages of a Defense-in-Depth Cybersecurity Strategy
July 2023
- Is Your Online Shopping App Invading Your Privacy?
- How Microsoft 365 Copilot Is Going to Transform M365 Apps
- Fight Business Email Compromise
- 10 Helpful Tips for Small Businesses
June 2023
- Is It Time to Ditch the Passwords for More Secure Passkeys?
- Create Dashboards in Power Bi
- What Is Push-Bombing?
- How to Use ChatGPT at Your Business Responsibly
May 2023
- Why App Fatigue is a Security Issue
- Virtual Appointments in Microsoft Teams
- Everyday Objects Can Steal Your Identity
- Technologies to Give You an Advantage
April 2023
- Data Backup Is Not Enough
- Microsoft Forms
- Think Twice Before Using Self-Portrait Apps
- Vulnerability Management for Your Tech
March 2023
- Should you spy on your Team?
- Scam texts from your CEO
- Mitigating Data Breach Costs
- Stop Online Banking Fraud
February 2023
- How Is the Metaverse Going to Change Business?
- Mobile Malware on The Rise
- Trends in Data Privacy
- Have You Had Data Exposed in a Recent Data Breach
January 2023
- What's Changing In The Cybersecurity Insurance Market?
- Align Your Team To Company Targets With Microsoft Viva Goals
- What Cybersecurity Attack Trends Should You Watch Out For In 2023?
- 7 VoIP Setup Tips For A More Productive Office
December 2022
- How Preferred IT Group Saved Christmas
- How Has Technology Changed Holiday Traditions?
- Our CEO Is A Published Author
- 10 Cybersecurity Tips For The Holiday Season
November 2022
- Dropbox Suffers Major Breach In Phishing Attack
- IT Professional Say Business VPN Attacks Are On The Rise
- Our CEO Is A Published Author
- Socktober Success!
October 2022
- October Is Cybersecurity Awareness Month
- Spooky Technologies That Exist Today
- Our CEO Is A Published Author
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
September 2022
- Tesla Owner Implants Chip In Hand To Unlock, Start Car
- A High Severity TikTok Vulnerability Allowed One-click Account Hijacking
- Our CEO Is A Published Author
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
August 2022
- Teaching Cybersecurity Education At Home
- 5 Modern Technologies ‘The Jetsons’ Accurately Predicted 60 Years Ago
- Our CEO Is A Published Author
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
July 2022
- How Old Is Google? History Of The World’s Most Popular Search Engine
- Make Sure You’re Not Ignoring The Biggest Cybersecurity Threats
- Our CEO Is A Published Author
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
June 2022
- Researchers Reveal ‘Follina’ Zero-Day Vulnerability In Microsoft Office
- Ways To Clean Up Social Media
- Our CEO Is A Published Author
- Welcome Back Gabe!
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
May 2022
- 7 Reasons You Need An Incident Response Plan
- Why Multi-Factor Authentication (MFA) Is Important
- Our CEO Is A Published Author
- Employee Spotlight: Sully Horne
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
April 2022
- Windows 11 Gets A New Desktop Watermark On Unsupported Hardware
- What Is Smishing And How To Defend Against It?
- Our CEO Is A Published Author
- Meet Caleb Harter
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
March 2022
- Luck Is For Leprechauns! Make Sure Your Data Is Safe.
- Microsoft Accounts Targeted By Russian-Themed Credential Harvesting
- Our CEO Is A Published Author
- Meet Matt Smith
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
February 2022
- Romance Scams Ahead of Valentine’s Day
- 5 Tips To avoid Being Scammed When Using A Payment App
- Our CEO Is A Published Author
- Grabbing The Bull By The Hornes - Preferred IT CEO, Jason Horne, Is Gaining Ground Fast
January 2022
- Technology Resolutions for 2022
- 5 Cybersecurity Trends To Watch In 2022
- Our CEO Is A Published Author
- Meet Jeremy!
- PITG Holiday Party
December 2021
- The Snow Filled The Magical Night...
- Top Holiday Scams To Watch Out For This Holiday Season
- Holly is Back!
- We Love Our Interns
- Meet Garrett
November 2021
- Technology To Be Thankful For
- Pegasus Spyware Group Blacklisted By The US Government
- Our CEO Is A Published Author
- Socktober Success!
- Annual Halloween Costume Contest
Octorber 2021
- 7 Spooky Scam Calls
- Cyber Lessons: Arm Yourself With Knowledge To Stay Ahead Of The Game
- Our CEO Is A Published Author
- Socktober Is Here!
- Three Cheers For 7 Years!
September 2021
- Is Your Business Protected With Cyber Liability Insurance?
- Nigerian Threat Actors Solicit Employees to
Deploy Ransomware for Cut of Profits - Our CEO Is A Published Author
- Happy Birthday Christopher!
- Advantages To A Dog Friendly Workplace
August 2021
- Tokyo’s Olympic Medals Are Made Entirely From Recycled Gadgets
- Federal Cybersecurity Defenses Not Strong Enough to Protect American Data
- Our CEO Is A Published Author
- Happy Birthday Amy and Carter!!
- Federal Cybersecurity Defenses - Continued
July 2021
- Windows 11 - The Good, The Meh, The Ugly
- Summer Scams AndHow To Avoid Them
- Our CEO Is A Published Author
- Why It’s Easy For Hackers To Hack
- Sully on Vacation!
June 2021
- Inside the Amazon Warehouse - Humans and Machines Working Together
- Ransomware As A Service
- Our CEO Is A Published Author
- PITG Birthday Boys
May 2021
- The Global Chip Shortage Is Starting To Have Major Real-world Consequences
- US Passes Emergency Waiver Over Fuel Pipeline Cyber-attack
- May The 4thBe With You
- The Great American Cleanup
April 2021
- New Cyberthreats Remind Us OfThe Need For Hyper-vigilance
- What Is BusinessContinuity And WhyIs It Important?
- Top Technology Trend for 2021 - Internet of Things (IoT)
March 2021
- Just Because You’ve Been LUCKY EnoughTo Avoid A Cyber-Attck Doesn’t MeanYou’re Not At Risk
- New Wearable DeviceTurns Your Body Into ABiological Battery
- 7 Surprising Facts AboutSt. Patrick’s Day
February 2021
- Valentine’s DayPhishing Attacks
- 11 Tips ForDitchingDoomscrolling
- If you use any of these Chrome extensions, delete them right now!
January 2021
- Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code
- Adobe Flash Player is Finally Laid to Rest
- PITG Ugly Christmas Sweater Contest
December 2020
- The Snow Filled The Magical Night...
-
Top HolidayScams in 2020
-
Holly is Back!
November 2020
- Backup and DistaterRecovery can helpyou feel verythankful indeed!
-
5 Online Shopping Tips To Stay Safe This Holiday Season
-
Preferred IT Group’s Annual Halloween Costume Contest
October 2020
- How Is Wearable Technology Changing Halloween?
-
Your Computer Network Is Being Haunted
-
BEFORE THE BREACH
September 2020
-
If it sems too good to be true, it's most likely a scam.
-
Why Your IT Disaster Recovery Plan Should Be A Top Priority
-
BEFORE THE BREACH
August 2020
-
Every kid is unique and it’s important to find out what works best for your child.
-
Why Your IT Disaster Recovery Plan Should Be A Top Priority
-
BEFORE THE BREACH
July 2020
-
SurveyMonkey Phishing Scam
-
Technology Trends ForThe Next Decade
-
BEFORE THE BREACH
June 2020
-
The History of Emojis
-
6 Signs Your Computer is Infected With a Virus
-
BEFORE THE BREACH
April 2020
-
Five ways to thrive while working from home during the coronavirus pandemic
-
Coronavirus stimulus scams are here. How to identify these new online and text attacks
-
BEFORE THE BREACH
March 2020
-
Shark Tank Star Barbara Corcoran Loses Almost $400,000 in Email Scam
-
Coronavirus Scammers Are Seeking to Profit Off the Deadly Virus
-
BEFORE THE BREACH
February 2020
- FBI Warns of New Online Threat to Personal Credit Card Information
- Big Microsoft Data Breach 250 Million Records Exposed
- Hackers Are Here! New Skills For A New Fight
January 2020
- Proactively consider tools to detect anomalous behavior, automatically remidiate, and segment threats
- Top Data Breaches of 2019
- Hackers Are Here! New Skills For A New Fight
December 2019
- Merry Christmas to all, and to all a good night!
- 12 SCAMS OF CHRISTMAS
- Hackers Are Here! New Skills For A New Fight
November 2019
- Why third-party remote access is the biggest security threat to networks
- Attackers Hide Behind Trusted Domains, HTTPS
- Hackers Are Here! New Skills For A New Fight
October 2019
- Don’t Fall Victim To This Scam! They Count On You Acting Quickly Without Thinking It Through
- Urgent Warning: Netflix Phishing Scam
- Socktober is here and we need your help!
September 2019
- Implementing An Effective Cybersecurity Strategy Is Critical
- Multifactor Authentication And Why It Is So Important
- Before The Breach: Hackers Are Here! New Skills For A New Fight
August 2019
- Being A Hacker Is Almost A Dirty Word
- Louisiana Declares State Of Emergecy After Ransomware Attack
- Before The Breach: Hackers Are Here! New Skills For A New Fight
July 2019
- Nsa Cybersecurity Advisory: Patch Remote Desktop On Legacy Versions Of Windows
- Does Your Business Have A Disaster Recovery Plan
- Before The Breach: Hackers Are Here! New Skills For A New Fight
June 2019
- 5 Ways To Spot Fake Emails And Stay Safe
- Spooked About Your Network’s Security?
- Before The Breach: Hackers Are Here! New Skills For A New Fight
May 2019
- URGENT WARNING FOR BUSINESSES RUNNING
- 5G Then, Now, and Tomorrow
- BEFORE THE BREACH
April 2019
- 4 DEADLY MISTAKES YOU’RE MAKING WITH IT SECURITY
- Better to stay one step ahead with an MSP by your side.
- Top Tips To Prevent Cybercriminals From Hacking Your Network
March 2019
- 3 IT INVESTMENTS YOU SHOULD NEVER SKIMP ON
- Does Your Business Have a Disaster Recovery Plan?
- 3 Ways Your Employees Will Invite Hackers Into Your Network
February 2019
- Costs of Band-Aid Solutions
- 9 Things Your Kid Can Teach You About Internet Security
- Real Ransomware Statistics for 2019
January 2019
- 3 Fatal Errors when Hiring Computer Support
- 90 Ways to Be Better This Year
- Tips for Staying Secure Against Ransomware
December 2018
- The Importance of a Human Firewall
- Cybercrime Refresher
- The Dangers of Low Security Awareness
November 2018
- Prevent Cyber Crime: What Not to Do
- Does Your Business Have a Disaster Recovery Plan
- 6 Office Security Tips
October 2018
- Critical cloud computing facts
- Lessons from the coach's playbook
- Ransomware prevention tips
September 2018
- Scary emails you should never open
- Using social media like a pro
- Types of cybercrime
August 2018
- Preparing your small business for tornado season
- Daily habits that are killing your work-life balance
- A company policy on cybersecurity
July 2018
- How to identify cyber threats and prevent them
- Entrepreneurial advice to shorten the learning curve
- 6 tricks to help avoid phishing attacks
June 2018
- 3 IT investments you should never skimp on
- 3 big business trends
- Your data is safer in the cloud
May 2018
- Is your cyberprotection up to date?
- A brief history of internet security
- Why is two-factor authentication important?
April 2018
- What is a business continuity plan?
- Keep your best employees from leaving
- How your company's data is being leaked online
March 2018
- The dangers of human error
- Benefits of a hybrid cloud solution
- Answer these questions about cybercrime
February 2018
- Who's the biggest target for a cybercriminal?
- 9 apps you should download today
- Protect yourself from Spectre and Meltdown
January 2018
- Don't hire inexperienced "professionals"
- Run your meetings like a CEO
- Prevent hackers from stealing your phone data