Sourcing your tech perspective
TechRoots Blog
Cyber Security
What are Phishing Attacks and How to Prevent Them January 20, 2015
There has been a rise in the phishing industry lately. However these phisherman sport more sophisticated and advanced gear in their tackle box than the good ol’ worm and bobber. Phishermen prowl for personal passwords, email addresses, credit card information, pin numbers and other forms of personal information that can lead to some form of money. This […]
Keep ReadingWhat's new
The Latest Blog
Articles
subscribe by email
Stay Ahead
-
Hardware & Software
Do You Use Microsoft Office, Google Docs or LibreOffice?
January 12, 2015
-
Training and Certification
Why get Certified: Top 5 Reasons
January 7, 2015
-
Giving Back
Phoenix TS Supports Local and National Education Initiatives
January 6, 2015
-
News
FITSI Names Phoenix TS New Authorized Training Center!
November 13, 2014
-
Cyber Security
Former NSA Chief brings IronNet to Howard County
November 11, 2014
-
Tech Jobs
Open Source World Opens Doors for Tech Jobs
November 10, 2014
-
Cyber Security
The Difference between RMF and CAP
November 3, 2014
-
Events
Howard County Students Train to Meet the Growing Cyber Security Demand
September 23, 2014
-
Cyber Security
The Impact of the iCloud Breach on Password Mangement
September 17, 2014