Blog

Small Business HR & Payroll Made Easy (and Safeguarding Your Company from Phishing Attacks)

In this episode of Breaking Down I.T. with Steve, we welcome back Erik Swanson from Cardinal Services. Erik specializes in bringing the power of big-company HR, payroll, and benefits solutions to small businesses at a fraction of the cost. We’ll discuss how Cardinal Services handles all the complex paperwork required by federal, state, and local…

Krispy Kreme Gets a Bad Taste: Cyberattack Bites into Donut Giant

Krispy Kreme Hit by Cyberattack: A Wake-Up Call for Businesses Donut lovers beware: your online Krispy Kreme orders might be on hold thanks to a recent cyberattack. The company reported unauthorized activity on its IT systems on November 29th, 2024, leading to disruptions in online ordering, particularly in parts of the United States. While all…

Don’t Get Hooked: Protecting Yourself from Phishing and Spam

In this week’s episode of “Breaking Down I.T. with Steve,” we’re diving headfirst into the murky waters of unwanted emails: spam and phishing. We’ll dissect these two cyber threats, exploring their unique tactics and uncovering the subtle differences that can spell disaster if ignored. But that’s not all! Steve will arm you with the knowledge…

Starbucks Faces Payment Disruptions After Vendor Ransomware Attack

A Bitter Brew: Starbucks Caught in the Crossfire of a Cyberattack In a recent turn of events, Starbucks, the global coffee giant, has found itself entangled in the aftermath of a ransomware attack on one of its third-party vendors. This cyber incident has led to significant disruptions in the company’s ability to pay its baristas…

Apple Addresses Critical Zero-Day Vulnerabilities Affecting Intel-Based Macs

Apple has addressed two critical zero-day vulnerabilities that were actively exploited by attackers to target Intel-based Macs. The flaws resided in macOS Sequoia’s JavaScriptCore (CVE-2024-44308) and WebKit (CVE-2024-44309) components. The more severe vulnerability, identified as CVE-2024-44308, could enable attackers to execute malicious code remotely via specially crafted web content. By contrast, the other flaw (CVE-2024-44309)…

Elevating Small Businesses, One Tech Solution at a Time

PDX IT Services, led by industry veteran Steve Shaff, is dedicated to rescuing small businesses from IT chaos. With over 25 years of experience working with Fortune 500 companies and small businesses alike, Steve understands the unique challenges faced by small business owners. PDX IT Services provides comprehensive IT solutions tailored to the specific needs…

Part 2 with our special guest Victoria Dean – Story Time with Victoria Dean

Join us for Part 2 of our Breaking Down I.T. podcast as we sit down with Victoria Dean, a seasoned IT professional from TAK Consulting. In this episode, we dive deep into the world of IT and business, sharing firsthand experiences and valuable insights. Victoria takes us on a nostalgic journey, recounting tales of hosting…

Cybersecurity Nightmare: Cisco Data Breach and the Implications for Businesses

A threat actor known as IntelBroker has claimed to have breached Cisco’s systems on October 6th, 2024, stealing a vast amount of sensitive data. The stolen data allegedly includes source code, credentials, certificates, customer data, and private keys. The actor has also released a list of companies whose production source code was allegedly compromised, including…

http://pdxittech.com/wp-content/uploads/2024/06/cropped-Black-and-Gold-Classy-Minimalist-Circular-Name-Logo_20240530_123052_0000.png

How PDX IT Services Can Protect Your Business from Data Breaches

Given the recent data breach at Globe Life and the increasing threat of cyberattacks, businesses must prioritize robust cybersecurity measures. PDX IT Services can offer a comprehensive suite of solutions to protect your organization from data breaches and other cyber threats. Here’s how: 1. Risk Assessment and Vulnerability Management: 2. Network Security: 3. Endpoint Security:…