Keep up with the latest I.T. industry news

From your I.T. experts at PC Corp.

How To Protect Your Information Displayed on Screen

Outside of a controlled and private workspace, sensitive information is exposed to Visual Hacking – the act of viewing or capturing sensitive, confidential and private information for unauthorized use. It can be as simple as someone positioning themselves close enough to see information displayed on a monitor, or using a camera to capture the information….

Read More

Meraki Cloud Managed Devices

Meraki offers an extensive portfolio of IT products designed for the modern enterprise. These products include wireless access points, security appliances, access and distribution switching, VoIP phones, mobility management, and video surveillance. Each arebuilt to work togetherto deliver a truly scalable and easy to manage comprehensive IT solution. Ask us about a FREE Meraki Access…

Read More

How To Recognize a Phishing Email

DOWNLOAD our guide on ‘how to spot a phishing email’ – it may help you stop an attack on your network. Please feel free to post and distribute this resource to your employees. “Small is the new big” when it comes to cyberattacks. Smaller, more personalized malware attacks are increasing in number and sophistication with unsuspecting employees…

Read More

Small Business

Education

Government

Enterprise