- Show all
- All
- Amateur Radio
- Announcements
- Antivirus
- Backup
- Coronavirus
- Cyber Crime
- Cyber Threat
- Cyberattack
- Cybersecurity
- Data
- Data Breaches
- Data Centers
- Events
- Flash
- Hackers
- Hacking
- IT Security
- Java
- Malware
- Managed Services
- Media
- Mobile Security
- Movies
- Network Security
- Networks
- News
- Passwords
- Pearl Technology
- People of Pearl Tech
- Peoria
- Phishing
- Social Media
- STEM Academy
- STEM Education
- System Updates
- Warshipping
STEM Academy Highlighted on ‘Greg and Dan’
Read moreThe Pearl Technology/Richwoods Township STEM Academy is embarking on its most ambitious project yet, and event was featured on Peoria radio Thursday morning.
1STEM Academy to Contact International Space Station
Read moreStudents at the Pearl Technology/Richwoods Township STEM Academy will talk with astronauts on the International Space Station via amateur radio this summer. This activity is part of the ARISS (Amateur Radio on the International Space Station) Program, which promotes learning opportunities as part of the STEM (science, technology, education and math) initiative.
The Biggest Cybersecurity Threat to Businesses
Read moreOctober is Cybersecurity Awareness Month, and for businesses in the modern age, cybersecurity deserves as much awareness as any other vital business function.
Talking Cybersecurity with ‘Greg and Dan’
Read moreWith recent cyberattacks affecting millions of Americans every day, should citizens be more proactive about cybersecurity?
FBI Agents to Speak on Cybersecurity for Business
Read morePearl Technology is partnering with the Peoria Area Chamber of Commerce to host a business seminar on Tuesday, October 17, 2017, from 9-11 a.m. where local FBI agents will speak on the importance of cybersecurity.
5 Tips for Safe Travels
Read moreHere are some traveling tips to keep your browsing secure when you’re on the move:
Use Wireless Networks Safely
Read moreWhether you’re working from home or a hotel, it’s important to exercise caution with wireless networks.
5 Steps to a Safer Workspace
Read moreDo you want to know one of the simplest and most overlooked security controls you can implement? Clean your desk!
Continuing the Password Conversation
Read moreBecause passwords are your first and often only line of protection from would-be hackers, the security community can never talk about them too much.
Addressing the Cyber Arms Race
Read moreThe cyber arms race is ugly. Even though new technology creates positive changes, it also falls into the hands of thieves. Malware, phishing, social engineering, and cyber attacks have proven to be incredibly lucrative.
Secure Your Information On Social Media
Read moreSocial engineering happens when an attacker exploits social media information in an attempt to gain trust from a victim.
Fight Malware With Data Backup
Read moreThere is a particularly nasty family of malware out there known as ransomware. It goes by names like Cryptolocker, Cryptowall, and a REALLY awful one known as MBR ransomware.
Kick Flash Out of the Nest
Read moreAdobe Flash was a fantastic program in the 90s and early 2000s. It empowered users to create fantastic, original content. But like a child who refuses to leave their parents’ house, Flash has overstayed its welcome.
Don’t Cancel That Task—Install the Updates
Read moreYou boot up your computer, and it happens again. A prompt pops up and asks you to install important system updates. Instead of clicking “remind me later,” install those updates!
Throw Out Your Flimsy Passwords
Read moreIf you were building a new house, you wouldn’t frame the walls with cardboard. You wouldn’t install floors made out of Styrofoam and bubble wrap. If you use short, simple passwords, you’re guarding your files and sensitive information with flimsy security.
5 Steps to Protect Your Mobile Devices
Read moreAre you reading this blog from a smart phone or tablet? Do you check your personal or business email on a smart phone or tablet? If you answered “yes” to either of these questions, you should continue reading and take the necessary steps to ensure the security of your mobile devices.
Stay Safe While Surfing
Read moreThink of your workplace as a beach. If you want to stay safe while surfing, you need to avoid sharks. These cunning beasts will wait until you’re not paying attention, and then LOOK OUT! Cue the Jaws theme.