- Show all
- All
- Amateur Radio
- Antivirus
- Backup
- Coronavirus
- Cyber Crime
- Cyber Threat
- Cyberattack
- Cybersecurity
- Data
- Data Breaches
- Data Centers
- Flash
- Hackers
- Hacking
- IT Security
- Java
- Malware
- Managed Services
- Mobile Security
- Movies
- Network Security
- Networks
- News
- Passwords
- Pearl Technology
- Peoria
- Phishing
- Social Media
- STEM Academy
- STEM Education
- System Updates
- Warshipping
How to Recognize a Phishing Attack
Read moreIn a world of ransomware and data theft, phishing attacks remain one of the biggest cybersecurity threats to businesses.
006 Worst Password Ideas You Should Avoid
Read moreIn the Mel Brooks classic Spaceballs, there’s a scene where the main villain, Dark Helmet, remarks on the stupidity of using a password like “12345,” remarking it’s the kind of password an idiot would use on his luggage lock.
6 Cybersecurity Resolutions to Make in 2019
Read moreThink back to some of the New Year’s resolutions you’ve made in the past. Maybe you resolved to lose weight. Maybe you resolved to quit smoking. How did those resolutions work out for you?
Pearl Tech President Named to ARISS Education Committee
Read moreAmateur Radio on the International Space Station (ARISS) has named David Johnson to their U.S. Education Committee.
Beware: 6 Holiday Cybersecurity Risks
Read moreThe holiday season is the perfect time to set aside our cares and enjoy the company of those we cherish the most.
6 Awesome STEM Toys for Kids
Read morePearl Technology’s passion for STEM education has never been a secret. Through our annual STEM Academy, we’re able to teach students valuable, hands-on lessons in the fields of science, technology, engineering, and mathematics.
6 Bone-Chilling Cybersecurity Horror Stories
Read moreIf the threat of a cyberattack frightens you, it’s for good reason. Cybercrime accounts for billions of dollars in victim losses, and the headache of recovering your data and safeguarding yourself and your customers is a horrifying prospect.
8 Cybersecurity Myths That Hurt Businesses
Read moreFrom DDOS attacks to ransomware, the digital landscape is a hostile environment for businesses. In recent years, many companies have made cybersecurity a top priority. However, persistent cybersecurity myths continue to spread misinformation and lead many other businesses to leave cybersecurity on the backburner, content with the idea that a cyberattack couldn’t possibly happen to them.
5 Hackers in Movies Who Make Us Laugh
Read moreFor decades, movies have portrayed hackers in a romantic—and sometimes puzzling—manner.
ISS Contact Highlighted on ‘Greg and Dan’
Read moreThe Pearl Technology/Richwoods Township STEM Academy wrapped up a week of classes and projects last week, but the best is yet to come.
STEM Academy Highlighted on ‘Greg and Dan’
Read moreThe Pearl Technology/Richwoods Township STEM Academy is embarking on its most ambitious project yet, and event was featured on Peoria radio Thursday morning.
STEM Academy to Contact International Space Station
Read moreStudents at the Pearl Technology/Richwoods Township STEM Academy will talk with astronauts on the International Space Station via amateur radio this summer. This activity is part of the ARISS (Amateur Radio on the International Space Station) Program, which promotes learning opportunities as part of the STEM (science, technology, education and math) initiative.
The Biggest Cybersecurity Threat to Businesses
Read moreOctober is Cybersecurity Awareness Month, and for businesses in the modern age, cybersecurity deserves as much awareness as any other vital business function.
Talking Cybersecurity with ‘Greg and Dan’
Read moreWith recent cyberattacks affecting millions of Americans every day, should citizens be more proactive about cybersecurity?
FBI Agents to Speak on Cybersecurity for Business
Read morePearl Technology is partnering with the Peoria Area Chamber of Commerce to host a business seminar on Tuesday, October 17, 2017, from 9-11 a.m. where local FBI agents will speak on the importance of cybersecurity.
5 Tips for Safe Travels
Read moreHere are some traveling tips to keep your browsing secure when you’re on the move:
Use Wireless Networks Safely
Read moreWhether you’re working from home or a hotel, it’s important to exercise caution with wireless networks.
5 Steps to a Safer Workspace
Read moreDo you want to know one of the simplest and most overlooked security controls you can implement? Clean your desk!
Continuing the Password Conversation
Read moreBecause passwords are your first and often only line of protection from would-be hackers, the security community can never talk about them too much.
Addressing the Cyber Arms Race
Read moreThe cyber arms race is ugly. Even though new technology creates positive changes, it also falls into the hands of thieves. Malware, phishing, social engineering, and cyber attacks have proven to be incredibly lucrative.