PCPC Reunites with the ASCII Group.

During the past year, PCPC has been very active in a growing number of  I.T. industry groups. One of the most dynamic of these is ASCII (not to be confused with the Ascii Group which is a local MSP firm).

  At their July 2018 annual meeting our Dr. Michael Buckner, President of PCPC met Alan Weinberger, the Founder, and Chairman of ASCII.  When Mr. Weinberger founded ASCII as a prominent lawyer in the tech industry he met Dr. Buckner at his first I.T. venture in Greenwich Village, New York.

Attending Industry Workshops on Cyber Security has Become a Major Commitment for PCPC

Attending industry workshops on Cyber Security has become a major commitment for PCPC.   Many exciting things have been happening in the New York Metro area, not the least of which was an Annual Conference presented by the industry-leading business consultant Robin Robins and her Technology Marketing Toolkit team.

The Importance of Cyberthreat Security Monitoring

Cybersecurity is a constant game of cat and mouse. The cyber threats of today are evolving and becoming more sophisticated at an incredible rate. The rate at which these threats have evolved has rendered many of the older security technologies ineffective.

5 Common IT + Tech Mistakes Made by Growing Businesses

Businesses of all sizes face a variety of IT challenges each day. The purpose of technology should be to help grow a business. The unfortunate reality of the situation is that often times the technology used to make work easier ends up hamstringing growth or being the root cause of our problems.

GDPR is Here. What Does That Mean For You and Your Data?

General Data Protection Regulation (GDPR) has finally arrived, but what is it?
GDPR is a series of data protection reforms set out by the European Commission. At its core, GDPR is designed to give citizens of the European Union more control over their personal data.

Building a Cybersecurity Culture at Work

When thinking of data breaches across the board, the initial thought that comes to mind is the lone hacker sitting at their computer attempting to gain access to a specific company's server. According to Eddie Schwartz, chair of ISACA's Cybersecurity Advisory Council, "If we look at security breaches over the last five to seven years, it's pretty clear that people, whether it's through accidental or intentional introduction of malware, represent the single most important point of failure in terms of security vulnerabilities.