top of page
Search
Feb 17, 20206 min read
How To Fix Your Super Slow Computer
Slow computers are frustrating, distracting, and in many cases, avoidable. There are tons of reasons why your computer could be sluggish—fro
41 views1 comment
Feb 7, 20203 min read
AMA sees surge in health IT adoption, 'rise of the digital-native physician'
Its new report on emerging technologies sees appetite and aptitude growing for telehealth and virtual visits, remote patient monitoring, cli
33 views0 comments
Jan 23, 20202 min read
Phishing attacks are becoming more personal
Check out this highly personalized and targeted phishing attempt one of our Bedrock employees received recently!
40 views0 comments
Jan 8, 20205 min read
How to Secure Your Wi-Fi Router and Protect Your Home Network
It's essential to keep your router secure. These simple steps will help secure your home network and devices, and significantly reduce
64 views0 comments
Nov 26, 20191 min read
Bedrock Technology Wins 2019 SAGE Award for Fastest Growing Company
Bedrock Technology is excited to have won a SAGE Award from the Greater Scranton Chamber of Commerce this year!
221 views0 comments
Aug 22, 20194 min read
6 Non-Email Phishing Attacks Everyone Should Identify Now
77 percent of phishing attacks are launched via file-less techniques that go undetected by standard endpoint security solutions. In other wo
84 views0 comments
Jul 30, 201910 min read
7 mobile security threats you should take seriously in 2019
Mobile security is at the top of every company's worry list these days — and for good reason: Nearly all workers now routinely access co
60 views0 comments
Jul 15, 20198 min read
4 tips for building a strong security culture
Security teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach
44 views0 comments
Jul 10, 20192 min read
More Than Half of Small and Medium-sized Business Devices Run Outdated Operating Systems
New research underscores security weaknesses in small-to midsized businesses including a dependence on antiquated Microsoft operating system
61 views0 comments
Jun 24, 20194 min read
Healthcare Data is a Hot Commodity for Hackers
The healthcare industry is high on hackers’ hit lists due to the volumes of sensitive personal information ranging from Social Security numb
59 views0 comments
May 14, 20196 min read
The Security of Connected Medical Devices
In few industries is the growth of connected devices so rapid and widespread as it is in the healthcare industry.
62 views0 comments
Apr 17, 20191 min read
Bedrock Technology to Host Electronics Recycling Fundraiser
After generating much interest at our recycling event last year, Bedrock Technology is excited to announce yet another electronics recycling
573 views0 comments
Apr 12, 20192 min read
How to Identify Email Spoofing
Email spoofing is when an email is forged by an attacker to make it appear that it's coming from someone else, usually someone you know,
114 views0 comments
Mar 20, 20193 min read
Where Should You Invest Your Cybersecurity Budget?
How much your business spends on cybersecurity matters very little. It’s how you spend it that makes a real difference.
46 views0 comments
Mar 6, 20193 min read
Is your IT System at Risk for a Physical Attack?
Here we take a look at some of the most common ways that cyber criminals can utilize physical attacks against your company, as well as some
51 views0 comments
Feb 21, 20195 min read
Legal IT Security Best Practices
Regardless of size, what are the best practices a firm should follow? The first order of business is to comprehend that security is an essen
38 views0 comments
Jan 18, 20192 min read
Digital tools in the financial services industry
For financial services firms, employing a digital-based strategy, especially when it comes to the less than glamorous-side of the business,
26 views0 comments
Jan 10, 20196 min read
Businesses Have the Power to Stop the Data Breach Epidemic
It's inevitable that some consumer data will be stolen through cyberattacks or exposed through errors that accidentally leave informatio
39 views0 comments
Dec 28, 20182 min read
5 Cybersecurity Habits Law Firms Should Kick in 2019
With 2019 just a few days away, lawyers and their firms should make a few cybersecurity-specific New Year’s resolutions.
31 views0 comments
Dec 20, 20187 min read
13 data breach predictions for 2019
Data breaches are inevitable. Here are some predictions from industry experts about where, how and why cyber criminals will attempt to break
37 views0 comments
bottom of page