Blog
News and Updates
The latest news and updates from Pathfinders IT.

Your Old Technology is Broken, and We’ll Prove It
We’re sure at some point you’ve used the idiom, “If it ain’t broke, don’t fix it,” particularly in regards to your IT. While it might

Don’t Ignore the Warning Signs of Phishing Attacks
When it comes to cybersecurity, the most important aspect is often pushed aside in favor of solutions that are easier to control, like firewalls, encryption,

Your Businesses Can’t Neglect Physical Security (Here’s Why)
While you’re busy shoring up your cybersecurity measures, it’s worth asking what you’re doing about physical security breaches. Considering the risk they pose to your

How to Ditch Sticky Note Passwords for Good
How many employees do you have who keep your company’s passwords on sticky notes stuck to their monitors? This simple, seemingly benign trick could be

Why Unmanaged “Digital Cruft” Is a Hacker’s Goldmine
Clutter accumulates everywhere—the household junk drawer, an employee’s car, and yes, even your business’ network. In your business network, this clutter is called “digital cruft”

The Critical Privacy and Network Risks of Smart Office Technology
Adopting smart office technology—from connected lighting and thermostats to sophisticated monitoring sensors—can transform your workspace, offering efficiency and a modern aesthetic. Yet, as IT experts,

Recycling Your Old Technology Might Just Save You Money
Technology doesn’t last forever, so what would you do if your keyboard or computer monitor bit the dust tomorrow? Some might just throw the technology

The Benefits (and Risks) of Hybrid Work
If one fact has been proven true, it’s that remote and hybrid work are not temporary trends; they are future operating models that help businesses

Want to Impress the Boss? These 8 Keyboard Shortcuts Should Help
There are a bunch of shortcuts that most (if not all, at this point) of us should already know… cut, copy, paste, new tab, things

The NSA Recommends You Power Down Your Phone At Least Once Per Week
Despite the immense productivity and convenience that come from using a smartphone, it’s important to remember that these devices are miniature computers in our pockets.

How to Get the Crown Jewels Stolen
It would seem that the people responsible for the recent heist at the Louvre, which netted over $101 million in jewelry, may have used a

Are You Ignoring “Warm” Cyberthreats Until It’s Too Late?
An old fable says that a frog placed in a pot of boiling water will jump out immediately, but if the water is warmed to