technology blog
news you can use
blog icons with keyboard

Technology Blog

news you can use!
featured blog posts

enjoying the content?

Sign-up for our newsletter and get the latest in technology news and information
(and your chance at winning a $25 Amazon Gift Card!)
(Don't worry we would never share your information with 3rd parties!)
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form

all blog posts

Network Security Target Mobile: 10 Tips for Securing Mobile Devices
Beth Stewart
July 12, 2017

Security measures that we use on a desktop or laptop are not possible on mobile, making phishing and similar attacks even more effective. Check out these tips for keeping your devices secure.

Software How to Fix the Missing Mail Tab Options in Outlook
Chris Neal
July 6, 2017

Are you missing the sorting and filtering options in Outlook 2016? Here is a step by step workaround to fix the missing mail tab options in Outlook. We'll have you back to sorting and filtering in no time!

EventsSpread the Word and Get Rewarded
Beth Stewart
June 29, 2017

Referrals from valued clients and colleagues are the highest compliments we can receive, so as our way of saying thanks, we'll give you a $250 Gift Card!

EventsWebsite Redesign
Beth Stewart
June 12, 2017

Our redesigned site provides instant access, expanded resources and increased security.

EventsYeti Cooler Raffle at Spartan West Rotary
Beth Stewart
January 31, 2017

Yeti Cooler Raffle proceeds will be used to purchase Shelterbox disaster relief kits.

Privacy and Security Cyber Safe Shopping
Beth Stewart
December 2, 2016

Whether you're part of the hustle and bustle or filling your cart from the comfort of your home, these tips can help you make it a safe shopping season!

EventsNCSAM Workshop: Cyber Smart Business
Beth Stewart
October 21, 2016

National Cyber Security Awareness Month workshop at The Hendersonville Chamber of Commerce to help you create a cyber smart culture within your business.

Privacy and Security The Importance of an Acceptable Use Policy
Beth Stewart
September 28, 2016

Why an Acceptable Use Policy or AUP is an integral part of your information security policy.

EventsFishing...MUCH better than Phishing
Beth Stewart
September 15, 2016

We're excited to be a returning sponsor of the Chapman Fishing Team and look forward to this tournament season!

Privacy and Security Social (Media) Security Part 2
Beth Stewart
September 9, 2016

As our Securing Social Media blog series concludes, we provide you with details for securing your Twitter and Google accounts.

EventsSeptember is National Preparedness Month
Beth Stewart
September 6, 2016

Information and resources to help you and your family plan for disasters of all types, leading up to National PrepareAthon! Day on September 30th.

Network Security 5 Mistakes That Can Jeopardize Your Network Security
Beth Stewart
July 11, 2016

If you think network security is simply a matter of changing passwords and updating antivirus software. Think Again.

Privacy and Security Social (Media) Security
Beth Stewart
June 30, 2016

We've got tips to help you secure your businesess' social accounts against security and privacy risks.

EventsCriterium Tailgate Party 2016
Beth Stewart
May 18, 2016

This year’s Criterium Tailgate Party turned out to be our biggest and best event (yet) and we are already looking forward to 2017!

Network Security Wireless - Are Your Guests Welcome?
John Sinderman
April 14, 2016

If your wireless network is not implemented correctly, it can also be providing access to your sensitive data.

Client SpotlightTaylor Enterprises, Inc - Pivotal IT Client Spotlight
Beth Stewart
August 13, 2015

We recently spoke with Brian Osburne, CFO of Taylor Enterprises, to learn more about the company’s history, services and the impact technology has had on their operations.

Client SpotlightPartners for Active Living - Keeping Spartanburg Moving
Beth Stewart
June 18, 2015

Partners for Active Living has been instrumental in keeping Spartanburg moving

Business ContinuityBusiness Continuity provides Summertime Peace of Mind
Beth Stewart
June 9, 2015

Here in the South, severe thunderstorms abound with lightning, hail, and heavy rain, don't let them threaten the security of your business data.

CompliancePCI DSS - The Payment Card Industry Standard
Beth Stewart
May 7, 2015

If you are a merchant that accepts credit card payments, you are required to be PCI DSS compliant and we have the details you need.

EventsCriterium 2015 - Pivotal IT Customer Appreciation Party
Beth Stewart
May 2, 2015

Our annual Tailgate Party at the Spartanburg Regional Healthcare Criterium provide us the chance to let our clients know how much we appreciate their business - for a great cause.

ComplianceSarbanes Oxley Compliance - Transparency and Responsibility
Beth Stewart
April 14, 2015

Information and tips for maintaining a SOX compliant network.

ComplianceGLB Act Compliance - Rules and Pretexting
Beth Stewart
April 3, 2015

The Financial Privacy Rule, The Safeguards Rule, and Pretexting Protection of the GLB Act are designed to protect consumers' nonpublic, personal information from disclosure.

ComplianceHIPAA Compliance: The Privacy and Security Rules
Beth Stewart
March 25, 2015

HIPAA Compliance: The responsibilities of Business Associates under the Privacy and Security Rules

ComplianceUnderstanding Compliance
Beth Stewart
March 19, 2015

We're delving into the compliance standards to help your business stay compliant and keep your customer’s information safe and secure.

Business ContinuityCovering Your ASSets
John Sinderman
January 15, 2015

Business Continuity - the continued ability to access your data and critical line of business applications in the event of a loss or disruption.

Case StudyCustomer Case Study -ServPro of North Spartanburg
Courtney Phillips
August 30, 2014

With a dicey server frequently crashing and causing a major drop in productivity - a call to Pivotal IT provides a revamped and stabilized network.

Network Security Don't Be Scammed by Fake Tech Support Calls
Courtney Phillips
May 9, 2014

Scammers do their best to look legitimate, often using a mix of spoofed phone numbers and social engineering in attempt to gain access or information.

Network Security Tips to Avoid Being a Victim of Cyber Crime
Courtney Phillips
May 9, 2014

Security best practices to help you avoid being a victim of cyber crime.

Business ContinuityDo you have a disaster recovery plan?
John Sinderman
April 17, 2013

Fires, hardware failure, human error, theft, ransomware all pose a threat to your data and your network. A backup and disaster recovery plan can ensure you don't become a statistic.

Software What Are The Benefits of Hosted Exchange?
Beth Stewart
March 12, 2013

Is Microsoft Exchange the right choice for your business?

Business Continuity10 Backup and Disaster Recovery Statistics You Must Know
John Sinderman
August 5, 2012

If the security, stability and availability of your critical business data isn't a concern, it should be. Check out our list of backup and recovery statistics.