A lot is made about data breaches and hackers, but I think you’d be surprised to find out that over 80 percent of cyberattacks are the result of stolen authentication credentials. This has led many security-minded IT administrators to try and find a better way than the old username & password strategy that we’ve all been using for as long... Read More
GeekBox IT Understanding IT
Understanding Your Virtual Identity
We often talk about threats to business infrastructures, but the point stands that these same threats.
GeekBox IT's IT Threat Glossary
Understand what threats are in store for your business. The Internet can be a dangerous place.
Understanding Business Continuity
A Well-Structured Continuity Plan Can Save Your Business When the sky is falling on your business.
Understanding Windows 10
Understanding Windows 10 - Bringing Value to Business The latest Windows operating system for your IT infrastructure.
Understanding the Internet of Things
Understanding the Internet of Things Is your business ready for it?
Understanding Network Security Maximizing Your Business’ Security Businesses are often so concerned with their day-to-day operations.
Your company can make your staff’s devices work for your company. Learn more about BYOD policies.
Understanding PCI DSS
Secure Credit Card Transactions GeekBox IT provides solutions for companies searching for a secure interface.
HIPAA-Compliant Data Systems Laws for the secure and private transfer of individual's medical information.
The Definition of Cloud Computing Free yourself from traditional IT with Cloud Services and Cloud computing.