- Show all
- Amateur Radio
- Cyber Crime
- Cyber Threat
- Data Breaches
- Data Centers
- IT Security
- Managed Services
- Mobile Security
- Network Security
- Pearl Technology
- People of Pearl Tech
- Social Media
- STEM Academy
- STEM Education
- System Updates
STEM Academy Highlighted on ‘Greg and Dan’Read more
The Pearl Technology/Richwoods Township STEM Academy is embarking on its most ambitious project yet, and event was featured on Peoria radio Thursday morning.1
STEM Academy to Contact International Space StationRead more
Students at the Pearl Technology/Richwoods Township STEM Academy will talk with astronauts on the International Space Station via amateur radio this summer. This activity is part of the ARISS (Amateur Radio on the International Space Station) Program, which promotes learning opportunities as part of the STEM (science, technology, education and math) initiative.
The Biggest Cybersecurity Threat to BusinessesRead more
October is Cybersecurity Awareness Month, and for businesses in the modern age, cybersecurity deserves as much awareness as any other vital business function.
Talking Cybersecurity with ‘Greg and Dan’Read more
With recent cyberattacks affecting millions of Americans every day, should citizens be more proactive about cybersecurity?
FBI Agents to Speak on Cybersecurity for BusinessRead more
Pearl Technology is partnering with the Peoria Area Chamber of Commerce to host a business seminar on Tuesday, October 17, 2017, from 9-11 a.m. where local FBI agents will speak on the importance of cybersecurity.
5 Tips for Safe TravelsRead more
Here are some traveling tips to keep your browsing secure when you’re on the move:
Use Wireless Networks SafelyRead more
Whether you’re working from home or a hotel, it’s important to exercise caution with wireless networks.
5 Steps to a Safer WorkspaceRead more
Do you want to know one of the simplest and most overlooked security controls you can implement? Clean your desk!
Continuing the Password ConversationRead more
Because passwords are your first and often only line of protection from would-be hackers, the security community can never talk about them too much.
Addressing the Cyber Arms RaceRead more
The cyber arms race is ugly. Even though new technology creates positive changes, it also falls into the hands of thieves. Malware, phishing, social engineering, and cyber attacks have proven to be incredibly lucrative.
Fight Malware With Data BackupRead more
There is a particularly nasty family of malware out there known as ransomware. It goes by names like Cryptolocker, Cryptowall, and a REALLY awful one known as MBR ransomware.
Kick Flash Out of the NestRead more
Adobe Flash was a fantastic program in the 90s and early 2000s. It empowered users to create fantastic, original content. But like a child who refuses to leave their parents’ house, Flash has overstayed its welcome.
Don’t Cancel That Task—Install the UpdatesRead more
You boot up your computer, and it happens again. A prompt pops up and asks you to install important system updates. Instead of clicking “remind me later,” install those updates!
Throw Out Your Flimsy PasswordsRead more
If you were building a new house, you wouldn’t frame the walls with cardboard. You wouldn’t install floors made out of Styrofoam and bubble wrap. If you use short, simple passwords, you’re guarding your files and sensitive information with flimsy security.
5 Steps to Protect Your Mobile DevicesRead more
Are you reading this blog from a smart phone or tablet? Do you check your personal or business email on a smart phone or tablet? If you answered “yes” to either of these questions, you should continue reading and take the necessary steps to ensure the security of your mobile devices.
Stay Safe While SurfingRead more
Think of your workplace as a beach. If you want to stay safe while surfing, you need to avoid sharks. These cunning beasts will wait until you’re not paying attention, and then LOOK OUT! Cue the Jaws theme.