blog

learn more about how you can achieve your business’s
goals through information technology.

subscribe to our blog

How Often Do I REALLY Need to Backup Data?

Image of EJ Phillips
EJ Phillips

Your data is probably the single most important asset your company possesses.  The old adage, “cash...

Read more

Migrating to Office 365

Image of EJ Phillips
EJ Phillips

Migrating to Office 365 can really boost your organization’s productivity, but it is not without...

Read more

Change in Ticketing Procedure

Image of EJ Phillips
EJ Phillips

ProActive Information Management (pim) wants to make sure that having us as your IT managed...

Read more

Benefits of Changing Your Password Regularly

Image of EJ Phillips
EJ Phillips

The benefits of changing your password often cannot be underestimated. Your computer...

Read more

Top Ten Tips for IT Security

Image of Tatiana Humphrey
Tatiana Humphrey

The internet can be the wild west, with the threats of malware, ransomware, worms,...

Read more

RepProtect

Image of EJ Phillips
EJ Phillips

The following 2020 statistics are sobering: 

  • US organizations face the highest...
Read more

Whitelisting vs Blacklisting: What’s the difference?

Image of Alesha Chapman
Alesha Chapman

Whitelisting and Blacklisting are two main approaches to protecting your network from dangerous...

Read more

What is a Firewall?

Image of Derrick Lopez
Derrick Lopez

A firewall is security software that runs on a physical, virtual, or cloud-based device. It is an...

Read more

Malware and Computer Worms

Image of Carson Kosco
Carson Kosco

Malware is malicious software that gains access to your computer to cause harm and destroy your...

Read more

What is Ransomware?

Image of Paul Thrasher
Paul Thrasher

Ransomware is a type of malicious software, or malware, that prevents you from accessing your...

Read more
https://www.proactive-info.com/privacy-policy/