CLOSE
Enter your search term and press enter. Press Esc or X to close.
​

News/Blog

Whitepapers

Are these top insider threats lurking behind your doors?

Organizations sometimes fail to consider the true risks that insiders pose to their cybersecurity. Yet, internal risks are every bit as dangerous and damaging as the external ones, even if there is not malicious intent.

Find out if any of these top 5 insider threats are occouring in your business today!

Download Now

 

 

Beware: PayPal phishing texts state your account is 'limited'

A PayPal text message phishing campaign is underway that attempts to steal your account credentials and other sensitive information that can be used for identity theft. A new SMS text phishing (smishing) campaign pretends to be from PayPal, stating that your account has been permanently limited unless you verify your account by clicking on a link. "PayPal: We've permanently limited your account, please click link below to verify," the smishing text message reads. ... Read More
Posted by Jason Smith at Monday, January 4, 2021

Tis the Season for Holiday Online Shopping Scams—Don't Be a Victim

'Tis the Season for Holiday Online Shopping Scams—Don't Be a Victim MEMPHIS, TN—With more people than ever doing their holiday shopping online, FBI Memphis wants to remind shoppers to look out for scams designed to steal your money and personal information. Remember, if it looks too good to be true, it probably is! “According to the FBI’s Internet Crime Complaint Center (IC3), in 2019, Tennesseans lost over $33,052,233 due to a variety of scams,” said... Read More
Posted by Jason Smith at Tuesday, December 8, 2020

Ransomware Activity Targeting the Healthcare and Public Health Sector

Summary This advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection. This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the  ATT&CK for Enterprise version 7  for all referenced threat actor tactics and techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency... Read More
Posted by Jason Smith at Tuesday, December 8, 2020

Security Awareness Training- Recognizing a Threat- Vishing

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who are now having to protect users, data, and clients while workers connect remotely or at the office to corporate systems. Our focus will be to help you better understand what Vishing is, what it can do, and how to prevent a malicious Vishing event at the office or remote, let’s get started! What is “Vishing”? Vishing is a type of social... Read More
Posted by Jason Smith at Tuesday, October 6, 2020

Security Awareness Training- Recognizing a Threat- Seeding

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who are now having to protect users, data, and clients while workers connect remotely or at the office to corporate systems. Our focus will be to help you better understand what Seeding is, what it can do, and how to prevent a malicious seeding event at the office or remote, let’s get started! What is “Seeding”? Seeding is a type of social... Read More
Posted by Jason Smith at Tuesday, September 29, 2020

Security Awareness Training- Recognizing a Threat - Phishing

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who are now having to protect users, data, and clients while workers connect remotely or at the office to corporate systems. Our focus will be to help you better understand what a Phishing attack is, what it does, and 5 flags you can use immediately to help identify a Phishing attempt whether at the office or remote, let’s get started! What is “Phishing”? ... Read More
Posted by Jason Smith at Tuesday, September 22, 2020

Security Awareness Training- DNS Resolution

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who are now having to protect users, data, and clients while workers connect remotely or at the office to corporate systems. Our focus will be to help you better understand what DNS resolution is, what it does, and recommendations for how to protect data at the office or at home, let’s get started! What is DNS Resolution/ Filtering? In one word it’s a... Read More
Posted by Jason Smith at Tuesday, September 15, 2020

Security Awareness Training- Backup and Disaster Recovery

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who are now having to back up and protect data while users connect remotely to corporate systems. Our focus will be to help you better understand backup options, and recommendations for how to protect data at the office or at home, let’s get started! First, let us start by asking “do you know how much it costs your company to stop working for ONE day? As... Read More
Posted by Jason Smith at Tuesday, September 8, 2020

Security Awareness Training- Remote Access

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who have suddenly found their workforce remote and having to connect to corporate systems. Our focus will be to help you better understand the different ways users can remote into systems and the difference between accessing these at the office vs at home, let’s get started!   Let’s begin by addressing the ways we can access our systems remotely .  ... Read More
Posted by Jason Smith at Monday, August 31, 2020

Security Awareness Training- Passwords and Policies

We Continue our Security Awareness Training by addressing some of the most common challenges for organizations who have suddenly found their workforce remote, many with outdated or no “best in breed” Password policies. Our focus will be to help you better understand the potential risks associated when not using strong passwords and policies, and actions that can be taken to reduce the risks of Cybersecurity incidents, Hacking Attempts, Viruses and Malware associated. We will also... Read More
Posted by Jason Smith at Wednesday, August 26, 2020

The Biggest Information Technology Trend You Need to Know About in 2019

2019 Trends in Information Technology It’s hard to believe 2019 is already here, but it’s also exciting to look forward to a new year with new goals and new achievements in our industry. The IT sector has made significant improvements over the last few years, and every indication leads us to believe we can expect even more exciting things in 2019. The Biggest Technology Trend of 2019: IT Security Looking back on 2018 and which topics gained the most attention... Read More
Posted by Kevin O'Connell at Friday, March 15, 2019

What Every Office Needs in 2019: Cybersecurity Essentials

Essential Technology and Equipment for Every Business Whether your team has 5 or 500 individuals, there are some types of technology and equipment you simply can’t live without. In a world where data breaches happen every single day, it’s essential to create a secure network with software and hardware that works for you so that you can focus on what you do best and let your technology do the rest. So what type of technology and equipment are essential? Here’s a... Read More
Posted by Kevin O'Connell at Friday, February 15, 2019

How to Follow HIPAA with New Technology

What is HIPAA and what is it for? The Health Insurance Portability and Accountability Act of 1996, or HIPAA, is a law which seeks to protect sensitive patient data. Under HIPAA, healthcare providers are not permitted to provide a patient’s personal information to anyone unless the patient specifically allows them to or requests for them to do so. LEARN MORE Who is required to follow HIPAA? Most healthcare providers are required by law to protect patient... Read More
Posted by Kevin O'Connell at Thursday, January 31, 2019

How to Handle an IT Emergency: A Step-by-Step Guide

What Do I Do if I Have an IT Emergency? Whether you’re a small company or a large organization, an IT emergency can cost untold amounts of time and money to navigate. You may be wondering where to start in an overwhelming crisis involving a breach of security or system malfunction/failure. Here’s what you need to know in case of an IT emergency. 1. Call IT Support Directly following an IT emergency, contact an IT support team (or your in-house IT team) who can... Read More
Posted by Kevin O'Connell at Tuesday, January 15, 2019

IT for a Medical Office: What Do I Really Need?

5 Reasons to Hire an Information Technology Firm for Your Medical Practice If you’re a healthcare provider with access to patient records and personal data, you need technology and systems that can protect you, your staff, and your patients. Along with added security, medical technology offers many benefits, including less paper clutter, better communication between staff and patients, ease of filing insurance, and more. Here are just a few of the reasons to take advantage of... Read More
Posted by Kevin O'Connell at Thursday, November 29, 2018

What is the Future of IT Security? Security Trends of 2018

3 Reasons to Invest in Cyber Security Services 1. Avoid Significant Data Breaches As technology becomes more advanced, so do the methods and techniques of hackers and identity thieves. In order to prevent sensitive information from being seen and used by the wrong people, it’s absolutely essential that any business, regardless of size, invest in cyber security measures . For some industries, including medical centers and any organization that stores consumer credit card information... Read More
Posted by Kevin O'Connell at Friday, October 12, 2018

What is a Virtual CIO and How Can One Help Me?

What is a CIO? A chief information officer, or CIO, works closely with members of an IT department, or leads an IT department. CIOs are also commonly involved in the security , management, and proactive planning aspects of an organization’s technology systems and programs. From setting up hardware and software systems to maintaining secure networks that prevent consumer, customer, and employee information from being accessed by the wrong people, CIOs are an essential part of... Read More
Posted by Kevin O'Connell at Tuesday, September 25, 2018

The 4 Pillars of IT and Technology Management

Just about every business today uses some form of technology on a daily basis. With the abundance of technology systems and software on the market comes the need for proactive technology management and security . Whether you’re a small business or a large corporation, there are many reasons to consider investing in IT services from a managed service provider. What is a Managed Service Provider? Managed service providers, or MSPs, provide proactive IT and technology... Read More
at Wednesday, August 8, 2018

Our Enhanced, Full-Service IT Management Services

PCS Medical Services is Now PCS Managed Services Change can be intimidating, but sometimes change can be amazing. In an effort to provide even more technology users with access to better technology, better systems, and better workflows, we have expanded our services outside of the medical provider community. LEARN MORE ABOUT PCS-MS PCS-MS Managed Services now offers IT services to large and small organizations alike, and here are just a few of the ways we can help your... Read More
at Tuesday, July 17, 2018

Serge IT is now part of PCS Managed Services

Our firm began its professional practice in 1985 as Professional Computer Systems (PCS). Its growth over the past 33 years has been predominantly internal, stemming from the referrals of our client base and those of other professionals. The growth and development of our professional staff has evolved in a similar manner. We have attracted high-quality, committed professionals and invested in their training, development and growth. As a result of those efforts, we have experienced... Read More
at Wednesday, June 13, 2018

Let's Talk