ALL blog postsHow to boost your online presence for Business to Business MarketingThese free business listings can help to enhance your company's online presence, create brand awareness and boost your marketing efforts. SMB Marketing 1/15/25How to use SEO to Boost your Business to Business MarketingYour company's online presence plays a vital role in business to business marketing. Our first post in this blog series provides information and actionable tips for improving your on page SEO.SMB Marketing 11/18/24Repeating (Deceptive) PatternsA look at how prevalent the dark patterns of deceptive design have become since our 2019 blog post Privacy and Security 7/24/24Common Attack Vectors Attack vectors are the specific path, method or scenario that an attacker uses to gain entry to a network. Being informed about attack vectors and how they work can help you better identify and avoid them.Network Security 6/5/24Understanding Attack SurfacesAwareness of the potential paths a cybercriminal could use to gain entry to your network (and data) can offer insight to help to keep it secure.Network Security 4/16/24Identity Management Day 2024Founded by the Identity Defined Security Alliance (IDSA) and supported by the National Cybersecurity Alliance (NCA), the mission of Identity Management Day is to educate business leaders, IT decision makers and the public on the importance of identity management.Privacy and Security 4/9/24Data Privacy Week 2024As a returning Data Privacy Week Champion organization, Pivotal IT recognizes and supports the principle that all organizations share the responsibility of being conscientious stewards of personal information and urge everyone to take control of their data. Privacy and Security 1/22/24Getting Ready for Windows 11 Planning in 2024 can help ensure your machines meet the requirements for the transition to Windows 11 (or 12?), unless you plan on subscribing to the ESU program for Windows 10.Hardware & Software 12/13/23Cybersecurity Awareness Month 2023Now in its 20th year, Cybersecurity Awareness Month 2023 is highlighting the growing importance of cybersecurity in our daily lives.Privacy and Security 10/2/23Security & Privacy in the Time of AI Important security and privacy implications to consider before adopting AI technologies for your businessPrivacy and Security 8/15/23How to Stay Cybersafe on VacationDon't put your sensitive information at risk while on vacation or traveling - these cybersecurity tips will help keep you safe while on the go.Privacy and Security 7/6/23Understanding the Dark WebAlthough the Dark Web may seem distant and irrelevant to your everyday business operations, in reality it poses serious risks that can have far-reaching consequences.Privacy and Security 6/9/23How to set up Microsoft Outlook Email Signature TemplatesCheck out our step by step guide for customizing and using Microsoft's email signature gallery templates to add a professional touch to all of your Outlook emails. Hardware & Software 4/21/23Identity Management Day 2023Identity Management Day aims to inform about the dangers of casually or improperly managing and securing digital identities by raising awareness, sharing best practices, and inspire individuals and organizations to act. Join us on the journey to better identity management!Network Security 4/10/23Business Email Compromise Between 2020-2021, U.S. businesses lost over $2.3 Billion more to BEC/EAC attacks than to Ransomware. Discover how these attacks work, how to recognize them and the best practices for protecting your business against these scams. Network Security 3/21/23National Cybersecurity Awareness Month 2022Be #CyberSmart! Join Pivotal IT in celebrating National Cybersecurity Awareness Month - throughout October we will be sharing information and tips to help you stay safe online.Privacy and Security 10/1/22Fight the Phish - Fundamentals for Shoring Up Phishing Defenses Phishing has been a mainstay in the cybersecurity threat landscape for decades, but it is still one of the most dangerous and effective attack vectors. Check out these best practices and tips to help you fight the phish.Network Security 10/22/212021 National Cybersecurity Awareness MonthIt's almost here! Join us in celebrating National Cybersecurity Awareness Month! We will be sharing tips, and information all month long to help you #BeCyberSmartNetwork Security How to protect your network in the 2021 Threat LandscapeCustom intrusion tools and new attack vectors that rely on fear, waiting and watching have resulted in attacks of unprecedented size and scope. These best practices can help you keep your network and data secure.Network Security 3/26/21Data Privacy Day 2020Consumers are becoming more concerned about who can access their information and why. With the California Consumer Privacy Act taking effect this year and other states considering similar legislation, data privacy will become a central issue for businesses in 2020.Privacy and Security 1/28/20National Cybersecurity Awareness Month 2019We're excited to be returning as a NCSAM Champion and throughout the month of October we'll be sharing tips, information and resources to promote the awareness of online safety and privacy for National Cybersecurity Awareness Month Privacy and Security Incidents, Breaches & YouAn industry specific look at the threats, patterns and motivations behind the cyber attacks targeting small businesses - and how to defend against them. Network Security 8/9/19Exciting New Features Coming to OneDriveCombining AI and new technologies, Microsoft is bringing new innovations to help you and your team be more productive. We've got the latest information on the upcoming features, and when to expect them.Hardware & Software 5/23/19Dark Patterns - Deception by Design An in depth look at the unethical web practices and sophisticated tactics companies are using to manipulate your actions online. Privacy and Security 4/5/19World Backup Day 2019World Backup Day was chosen to be the day before April 1st (April Fools) in order to drive the message that one should backup all those pictures, spreadsheets, love letters, cat pictures, & important financial documents before it's too late.Backup and Disaster Recovery3/29/19How to Spot Dangerous Email Attachments and Malicious LinksMalicious links and email attachments can quickly compromise your entire network. In this blog post we provide you with information, tips and links to help you spot potentially dangerous files and URLs that arrive in your inbox.Network Security 2/7/19How To Create An Acceptable Use PolicyAn Acceptable Use Policy encourages responsible use of your business network and technology resources. In this blog post we delve into the important elements that should be included in your policy to help you create an effective AUP, customized for your business needs. Privacy and Security 12/4/18Get To Know Our CEO - He Rocks!Happy National Drumming Day! We sat down with Pivotal IT CEO, John Sinderman to chat about his passions - bringing Pivotal IT clients the best in technology services and playing drums.Spotlight11/15/18National Cybersecurity Awareness Month 2018October is National Cybersecurity Awareness Month! Protect your business – no matter how large or small – with alerts, tips and resources from the National Cyber Security Alliance. Privacy and Security 10/19/18Preparing Your Business for Hurricane FlorenceFlorence, one of the strongest hurricanes on the Eastern Seaboard in decades, is heading for the Carolinas. We've gathered resources, links and information to help you prepare yourself and your business to weather the storm. Business Continuity9/12/18Fileless Malware: How It Works and How To Avoid It Occasionally know as non-malware, fileless malware lives in your computer’s RAM, doesn’t use software, and attacks vulnerabilities within the computer’s operating system and software programs.Network Security 8/6/18Local Call Spam? Here's How to Block Robocalls on Landline and Mobile Robocallers and scammers disguise their actual phone numbers with fake numbers that appear to be local. In this blog post we'll walk you through blocking spam calls and provide you with best practices for dealing with robocalls and phone scams. Privacy and Security 6/14/18Small Business Data Loss – Key Causes for Avoidable Incidents Over 90 percent of reported data breaches have been caused by avoidable incidents. Understanding their key causes is vital to protecting your small business network and the data it holds. Business Continuity5/15/189 Attack Patterns of a Data Breach Since 2014, the majority of Data Breaches have used the same nine attack patterns - understanding them is key to developing an effective Cybersecurity Strategy. Network Security 3/12/18The Risks and Benefits of Shadow ITBlind spots in your network's security often happen in the space known as Shadow IT. Discover how to strike a balance between the needs of your end-users and keeping your sensitive data is secure. Network Security 1/31/18Data Privacy Day 2018In this blog post we explore key issues to consider when handling personal information and give you tips for creating a culture of respecting privacy, safeguarding data and enabling trust within your organization. Events1/15/18Spartan High Cyber VikingsIntroduced in 2009, the U.S. Air Force Association's Cyber Patriot program was designed to address a critical need: Drawing more students to education and careers in cybersecurity and other (STEM) fields. Privacy and Security 11/28/17How to Minimize the Impact of the Equifax Data Disaster Check out our practical, step-by-step guide for protecting your identity and your data in the wake of the Equifax data breach. Privacy and Security 9/27/17One Million Service Tickets!We’ve been fortunate to serve and form strong partnerships with some of the best small businesses and organizations across the Upstate of South Carolina and Western North Carolina. Thanks to you, we are able to celebrate this achievement. Events11/10/17National Preparedness Month 2017This year, as returning participant of National Preparedness Month, Pivotal IT will be providing information and resources to help you, your business and employees be prepared when disaster strikes. Events9/1/17Leader(s) of the Dog Days of Summer Pack The competition is heating up in the home stretch of our Dog Days of Summer Contest and these four are leading the pack.Events8/25/172017 NIST Guidelines Revamp Obsolete Password RulesThe 2017 NIST Digital Identity Guidelines show a shift in strategy in an effort to make it easier for users to create better passwords.Privacy and Security 8/22/17How to Fix the Missing Mail Tab Options in Outlook Are you missing the sorting and filtering options in Outlook 2016? Here is a step by step workaround to fix the missing mail tab options in Outlook. Hardware & Software 7/6/17Spread the Word and Get Rewarded Referrals from valued clients and colleagues are the highest compliments we can receive, so as our way of saying thanks, we'll give you a $250 Gift Card! Spotlight6/29/17Target Mobile: 10 Tips for Securing Mobile Devices Security measures that we use on a desktop or laptop are not possible on mobile, making phishing and similar attacks even more effective. Check out these tips for keeping your devices secure. Network Security 7/12/17HIPAA Compliance: The Privacy and Security RulesHIPAA Compliance: The responsibilities of Business Associates under the Privacy and Security RulesCompliance3/25/15Website RedesignOur redesigned site provides instant access, expanded resources and increased security. Events6/12/17Yeti Cooler Raffle at Spartan West RotaryYeti Cooler Raffle proceeds will be used to purchase Shelterbox disaster relief kits.Events1/31/17Cyber Safe ShoppingWhether you're part of the hustle and bustle or filling your cart from the comfort of your home, these tips can help you make it a safe shopping season!Privacy and Security 12/2/16NCSAM Workshop: Cyber Smart BusinessNational Cyber Security Awareness Month workshop at The Hendersonville Chamber of Commerce to help you create a cyber smart culture within your business. Events10/21/16The Importance of an Acceptable Use PolicyWhy an Acceptable Use Policy or AUP is an integral part of your information security policy.Privacy and Security 9/28/16Fishing...MUCH better than PhishingWe're excited to be a returning sponsor of the Chapman Fishing Team and look forward to this tournament season!Events9/15/16September is National Preparedness MonthInformation and resources to help you and your family plan for disasters of all types, leading up to National PrepareAthon! Day on September 30th.Events9/6/16Social (Media) Security We've got tips to help you secure your businesess' social accounts against security and privacy risks.Privacy and Security 6/30/16Criterium Tailgate Party 2016This year’s Criterium Tailgate Party turned out to be our biggest and best event (yet) and we are already looking forward to 2017!Events5/18/16Taylor Enterprises, Inc - Pivotal IT Client Spotlight Brian Osburne, CFO of Taylor Enterprises, shares information about the company’s history, services and the impact technology has had on their operations.Spotlight8/13/15Business Continuity provides Summertime Peace of MindHere in the South, severe thunderstorms abound with lightning, hail, and heavy rain, don't let them threaten the security of your business data.Business Continuity6/9/15Partners for Active Living - Keeping Spartanburg MovingPartners for Active Living has been instrumental in keeping Spartanburg moving Spotlight6/18/15Criterium 2015 - Pivotal IT Customer Appreciation PartyOur annual Tailgate Party at the Spartanburg Regional Healthcare Criterium provide us the chance to let our clients know how much we appreciate their business - for a great cause.Events5/2/15PCI DSS - The Payment Card Industry StandardIf you are a merchant that accepts credit card payments, you are required to be PCI DSS compliant and we have the details you need.Compliance5/7/15Sarbanes Oxley Compliance - Transparency and Responsibility Information and tips for maintaining a SOX compliant network. Compliance4/14/15GLB Act Compliance - Rules and Pretexting The Financial Privacy Rule, The Safeguards Rule, and Pretexting Protection of the GLB Act are designed to protect consumers' nonpublic, personal information from disclosure.Compliance4/3/15Social (Media) Security Part 2As our Securing Social Media blog series concludes, we provide you with details for securing your Twitter and Google accounts. Privacy and Security 9/9/16Understanding Compliance We're delving into the compliance standards to help your business stay compliant and keep your customer’s information safe and secure.Compliance3/19/15Tips to Avoid Being a Victim of Cyber CrimeSecurity best practices to help you avoid being a victim of cyber crime. Network Security 5/9/14Covering Your ASSets Business Continuity - the continued ability to access your data and critical line of business applications in the event of a loss or disruption.Backup and Disaster Recovery1/15/15Don't Be Scammed by Fake Tech Support CallsScammers do their best to look legitimate, often using a mix of spoofed phone numbers and social engineering in attempt to gain access or information.Network Security 5/9/14Wireless - Are Your Guests Welcome? If your wireless network is not implemented correctly, it can also be providing access to your sensitive data. Network Security 4/14/16Do you have a disaster recovery plan?Fires, hardware failure, human error, theft, ransomware all pose a threat to your data and your network. A backup and disaster recovery plan can ensure you don't become a statistic. Business Continuity4/17/13What Are The Benefits of Hosted Exchange?Is Microsoft Exchange the right choice for your business? Hardware & Software 3/12/1310 Backup and Disaster Recovery Statistics You Must Know If the security, stability and availability of your critical business data isn't a concern, it should be. Check out our list of backup and recovery statistics.Backup and Disaster Recovery8/5/12Customer Case Study -ServPro of North SpartanburgWith a dicey server frequently crashing and causing a major drop in productivity - a call to Pivotal IT provides a revamped and stabilized network.Case Study8/30/145 Mistakes That Can Jeopardize Your Network Security If you think network security is simply a matter of changing passwords and updating antivirus software. Think Again. Network Security 7/11/16