Pearl Technology Blog

STEM Academy to Contact International Space Station

Posted on 2/21/2018 by Pearl Technology in stem academy pearl technology amateur radio

Amateur radio connects kids and crew as ISS orbits through space.

Students at the Pearl Technology/Richwoods Township STEM Academy will talk with astronauts on the International Space Station via amateur radio this summer. This activity is part of the ARISS (Amateur Radio on the International Space Station) Program, which promotes learning opportunities as part of the STEM (science, technology, education and math) initiative.

read more..

The Biggest Cybersecurity Threat to Businesses

Posted on 10/18/2017 by Pearl Technology in cybersecurity cyber crime cyber threat

Be proactive against cyber threats.

October is Cybersecurity Awareness Month, and for businesses in the modern age, cybersecurity deserves as much awareness as any other vital business function.

read more..

Talking Cybersecurity with 'Greg and Dan'

Posted on 10/10/2017 by Pearl Technology in cybersecurity network security cyberattack hackers peoria

Pearl Technology featured on Peoria radio show.

With recent cyberattacks affecting millions of Americans every day, should citizens be more proactive about cybersecurity?

read more..

FBI Agents to Speak on Cybersecurity for Business

Posted on 10/4/2017 by Pearl Technology in cybersecurity cyber crime network security it security

Pearl Technology to host seminar for Cybersecurity Awareness Month

Pearl Technology is partnering with the Peoria Area Chamber of Commerce to host a business seminar on Tuesday, October 17, 2017, from 9-11 a.m. where local FBI agents will speak on the importance of cybersecurity.

read more..

5 Tips for Safe Travels

Posted on 4/21/2017 by Pearl Technology in Cyber Security

Here are some traveling tips to keep your browsing secure when you're on the move:

read more..

Use Wireless Networks Safely

Posted on 3/22/2017 by Pearl Technology in Cyber Security Networks

Whether you're working from home or a hotel, it's important to exercise caution with wireless networks.

read more..

5 Steps to a Safer Workspace

Posted on 12/22/2016 by Pearl Technology

Do you want to know one of the simplest and most overlooked security controls you can implement? Clean your desk!

read more..

Continuing the Password Conversation

Posted on 10/25/2016 by Pearl Technology in Cyber Security Passwords

Because passwords are your first and often only line of protection from would-be hackers, the security community can never talk about them too much.

read more..

Addressing the Cyber Arms Race

Posted on 10/23/2016 by Pearl Technology in Cyber Security Malware

The cyber arms race is ugly. Even though new technology creates positive changes, it also falls into the hands of thieves. Malware, phishing, social engineering, and cyber attacks have proven to be incredibly lucrative.

read more..

Secure Your Information On Social Media

Posted on 9/26/2016 by Pearl Technology in Cyber Security Social Media

Social engineering happens when an attacker exploits social media information in an attempt to gain trust from a victim.

read more..

Fight Malware With Data Backup

Posted on 8/30/2016 by Pearl Technology in Malware Backup Data

There is a particularly nasty family of malware out there known as ransomware. It goes by names like Cryptolocker, Cryptowall, and a REALLY awful one known as MBR ransomware.

read more..

Kick Flash Out of the Nest

Posted on 7/26/2016 by Pearl Technology in Cyber Security Flash

Adobe Flash was a fantastic program in the 90s and early 2000s. It empowered users to create fantastic, original content. But like a child who refuses to leave their parents' house, Flash has overstayed its welcome.

read more..

Don't Cancel That Task—Install the Updates

Posted on 6/8/2016 by Pearl Technology in System Updates Flash Java

You boot up your computer, and it happens again. A prompt pops up and asks you to install important system updates. Instead of clicking "remind me later," install those updates!

read more..

Throw Out Your Flimsy Passwords

Posted on 5/10/2016 by Pearl Technology in Cyber Security Passwords

If you were building a new house, you wouldn't frame the walls with cardboard. You wouldn't install floors made out of Styrofoam and bubble wrap. If you use short, simple passwords, you're guarding your files and sensitive information with flimsy security.

read more..

5 Steps to Protect Your Mobile Devices

Posted on 2/18/2016 by Pearl Technology in Cyber Security

Are you reading this blog from a smart phone or tablet? Do you check your personal or business email on a smart phone or tablet? If you answered "yes" to either of these questions, you should continue reading and take the necessary steps to ensure the security of your mobile devices.

read more..

Stay Safe While Surfing

Posted on 2/18/2016 by Pearl Technology in Cyber Security

Think of your workplace as a beach. If you want to stay safe while surfing, you need to avoid sharks. These cunning beasts will wait until you're not paying attention, and then LOOK OUT! Cue the Jaws theme.

read more..