• HOME

  • SERVICES

    • IT MANAGEMENT
    • SECURITY AND COMPLIANCE
    • ENTERPRISE NETWORKING
    • MEDICAL DICTATION
    • BEDROCK CLOUD SOLUTIONS
    • BEDROCK PREMISES SOLUTIONS
  • INDUSTRIES

    • BUSINESS
    • HEALTHCARE
    • DENTAL
    • GOVERNMENT
    • EDUCATION
  • SUPPORT

    • REMOTE SUPPORT
    • CLIENT PORTAL
  • COMPANY

    • CONTACT
    • JOB OPENINGS
    • NEW CLIENTS
  • BLOG

  • More

    Use tab to navigate through the menu items.
    Bedrock Technology Scranton Jenkintown

    CALL US TOLL FREE

    1.855.BEDROCK

    • All Posts
    • Cybersecurity Best Practice Series
    • Cybersecurity
    • Phishing
    • Compliance
    • Unified Communications
    • Mitel
    • Passwords
    • Managed Services
    • SaaS
    • Data Recovery
    • Security Camera
    • RingCentral
    • IoT
    • Medical Dictation
    Search
    Phishing attacks are becoming more personal
    • Jan 23, 2020
    • 2 min

    Phishing attacks are becoming more personal

    Check out this highly personalized and targeted phishing attempt one of our Bedrock employees received recently!
    20 views0 comments
    6 Non-Email Phishing Attacks Everyone Should Identify Now
    • Aug 22, 2019
    • 4 min

    6 Non-Email Phishing Attacks Everyone Should Identify Now

    77 percent of phishing attacks are launched via file-less techniques that go undetected by standard endpoint security solutions. In other wo
    34 views0 comments
    7 mobile security threats you should take seriously in 2019
    • Jul 30, 2019
    • 10 min

    7 mobile security threats you should take seriously in 2019

    Mobile security is at the top of every company's worry list these days — and for good reason: Nearly all workers now routinely access co
    23 views0 comments
    4 tips for building a strong security culture
    • Jul 15, 2019
    • 8 min

    4 tips for building a strong security culture

    Security teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach
    20 views0 comments
    How to Identify Email Spoofing
    • Apr 12, 2019
    • 2 min

    How to Identify Email Spoofing

    Email spoofing is when an email is forged by an attacker to make it appear that it's coming from someone else, usually someone you know,
    40 views0 comments
    5 Cybersecurity Habits Law Firms Should Kick in 2019
    • Dec 28, 2018
    • 2 min

    5 Cybersecurity Habits Law Firms Should Kick in 2019

    With 2019 just a few days away, lawyers and their firms should make a few cybersecurity-specific New Year’s resolutions.
    6 views0 comments
    13 data breach predictions for 2019
    • Dec 20, 2018
    • 7 min

    13 data breach predictions for 2019

    Data breaches are inevitable. Here are some predictions from industry experts about where, how and why cyber criminals will attempt to break
    21 views0 comments
    National Cybersecurity Awareness Month 2018
    • Oct 12, 2018
    • 2 min

    National Cybersecurity Awareness Month 2018

    Americans are spending more time online than ever before. As more people use the Internet for online shopping, banking, financial management
    18 views0 comments
    National Consumer Protection Week
    • Mar 6, 2018
    • 2 min

    National Consumer Protection Week

    Bedrock Technology has information for you during National Consumer Protection Week — March 4-10, 2018 — and any time of the year.
    12 views0 comments
    Best Practices: Social Media Accounts
    • Dec 7, 2017
    • 2 min

    Best Practices: Social Media Accounts

    Cyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cybe
    24 views0 comments
    Cybersecurity Best Practice Series: Website Navigation
    • Oct 4, 2017
    • 2 min

    Cybersecurity Best Practice Series: Website Navigation

    We finish off our cybersecurity mini series with a round up of tips on how to surf the net safe and secure.
    39 views0 comments
    Cybersecurity Best Practice Series: Phone Scams
    • Sep 28, 2017
    • 3 min

    Cybersecurity Best Practice Series: Phone Scams

    In this post we identify and discuss various phone call and texting scams for our ongoing cybersecurity best practices mini series.
    38 views0 comments
    Cybersecurity Best Practice Series: Phishing and Email Scams
    • Sep 22, 2017
    • 3 min

    Cybersecurity Best Practice Series: Phishing and Email Scams

    The next topic in our best practices series will focus on email scams/phishing.
    76 views0 comments

    1.855.BEDROCK
    [email protected]

    ​

    • Facebook - Black Circle
    • Black Twitter Icon
    • Black LinkedIn Icon

    READY TO START THE CONVERSATION?

    CONTACT BEDROCK TECHNOLOGY TODAY!

    Privacy Policy

    © 2022 Bedrock Technology