Follow Us
248-786-6100   |   Remote Support
blueRock Technologies
  • Home
  • Why BlueRock?
    • Testimonials
    • Partners & Certifications
    • Core Values
  • Services & Solutions
    • IT Managed Services in Michigan
    • IT Project Design and Delivery
      • Virtualization
    • Cloud Services
      • Private Cloud
      • Virtual Desktop (VDI)
      • Hosted Exchange
      • Hosted Servers
  • Industry Solutions
    • Hospitality
    • Healthcare
    • Financial
    • Manufacturing
  • About Us
    • blueRock Services Agreement
    • Contact Us
    • Support Center
    • Blog
    • Careers

Is your Office 365 environment secure?

August 6th, 2019 sdjones Office 2019august6office_a, business, cybersecurity, malware, Microsoft Office 365, productivity suite
Is your Office 365 environment secure?

Microsoft’s Office 365 is highly popular among businesses not just because of its robust features and cost-saving benefits but also because it’s widely perceived as secure. Unfortunately, using it comes with security challenges, but don’t fret — there are ways to solve them.

Read more

How to protect yourself from cryptojacking

May 7th, 2019 sdjones Hardware 2019may7hardware_a, cryptocurrency, cryptojacking, cybersecurity, dark web, Hardware, hijack, malware
How to protect yourself from cryptojacking

Cryptocurrencies such as Bitcoin and Monero are secure and potentially worth thousands of dollars, so naturally, hackers are looking for opportunities to mine them. They are using malicious tactics to obtain cryptocurrency, and they’re doing it with something called cryptojacking.

Read more

Every business needs an MSP for cybersecurity

March 22nd, 2019 sdjones Security 2019mar22_security_a, cybersecurity, itsecurity, malware, managedservices, ransomware, trojan
Every business needs an MSP for cybersecurity

The saying that every company is a technology company is undeniably true, with today’s enterprises unable to function without digital hearts, veins, and arteries. This system, however, comes with a price: a daily onslaught of hacking and other cyberthreats.

Read more

Fileless malware: Are you at risk?

February 19th, 2019 sdjones Security 2019february19security_a, cybersecurity, fileless, malware, security, stuxnet
Fileless malware: Are you at risk?

Fileless malware isn’t new and are an increasingly prevalent threat against organizations. This type of malware is not as visible as traditional malware and employs a variety of techniques to stay persistent. Consequently, it can adversely affect your business process and the infrastructures that run them.

Read more

Are autocomplete passwords safe?

January 31st, 2019 sdjones Security 2019january31security_a, auto-fill, chrome, cybersecurity, firefox, general articles a, passwords, privacy, safari, security, web browsers
Are autocomplete passwords safe?

Advertisements and “helpful” suggestions based on your internet browsing habits can be troubling. But what’s even more alarming is that hackers have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know.

Read more

Scammers deriving new ways to scam via VoIP

January 22nd, 2019 sdjones VoIP 2019january22voip_a, cybersecurity, internet telephony, phishing scam, vishing scam, voip
Scammers deriving new ways to scam via VoIP

Although many companies still use analog phones, a growing number of businesses now rely on VoIP (Voice over Internet Protocol), thanks to its multi-functionality. VoIP allows employees to make voice calls, conduct video conferences, and chat using an internet connection.

Read more

VPNs: Why you need them

January 8th, 2019 sdjones Security 2018december31security_a, cybersecurity, encryption, ip leaking, privacy, server, virtual private network, vpn
VPNs: Why you need them

Back in the day, simple antivirus software was all you needed to stay safe from security threats. Nowadays, it takes more than that to protect your online privacy. Whether you’re sending emails or chatting up a friend online, chances are your Wi-Fi connection can be intercepted.

Read more

How to safeguard PHI

January 7th, 2019 sdjones Healthcare 2019january7healthcare_a, access policies, anti-malware, cybersecurity, full-disk encryption, healthcare, phi, privacy
How to safeguard PHI

Healthcare organizations must be vigilant about avoiding data breaches, especially since they’ve been prime targets for cybercriminals for several years. Medical records are extremely valuable to hackers, which is why healthcare sectors must implement the most advanced security solutions.

Read more

Are your mobile devices protected?

December 12th, 2018 sdjones Hardware 2018dec12_hardware_a, cybersecurity, mobile device, smartphone, tags: hardware, threats
Are your mobile devices protected?

While mobile devices cannot equal what desktops and laptops can do, they’re inching pretty close to matching them. That’s why businesses are allowing their employees to use their smartphones and tablets, which help increase productivity and enhance collaboration.

Read more

Not all hackers are cybercriminals

November 28th, 2018 sdjones Security 2018november28security_a, black hat, cybersecurity, gray hat, hacking, white hat
Not all hackers are cybercriminals

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.

Read more
  • «
  • ‹
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • ›
  • »

Recent Posts

  • Make the most of your threat intelligence platform by following these tips
  • A step-by-step guide to building your own PC
  • Essential strategies to defend your VoIP system against TDoS attacks
  • Beyond the basics: Mastering essential Excel features in Microsoft 365
  • How hybrid cloud solutions drive resilience and competitive edge

Categories

Archives

Footer_logo

BlueRock Technologies

  • 560 Kirts Blvd
    Suite 122

    Troy, MI 48084
  • Phone: 248-786-6100
  • Fax: 248-786-6101

Follow Us


©2025 blueRock Technologies
All Rights Reserved.
blueRock Services Agreement
  • Privacy Policy
  • Privacy Policy