RedRock
  • About
  • Services
    • IT SERVICES
      • Managed IT Services
      • Custom Network Design
      • Microsoft 365
      • Data Center Hosting
      • Virtualization
    • RISK MANAGEMENT
      • Managed Perimeter Security
      • Backup and Disaster Recovery
      • Spam and Email Filtering
      • Vulnerability Scanning
    • COMPLIANCE
      • Managed Security Services
  • Process
  • Blog
  • REVIEWS
  • Careers
  • Customer Portal
  • Schedule a Consultation
  • Menu

Main Pages

  • About Us
  • Blog
  • Careers
  • Contact Us
  • fall2020
  • Home
  • Our Process
  • Support
  • Testimonials

Services Landing Pages

  • Backup and Disaster
  • Custom Network Design
  • Data Center Hosting
  • IT Compliance Review, Risk Assessments, Policies, Consulting
  • IT Compliance Review, Risk Assessments, Policies, Consulting for Credit Unions
  • Managed IT Services
  • Managed Perimeter Security
  • Managed Security Services
  • Microsoft 365
  • Network & Risk Assessments
  • Network Audit & Risk Assessments
  • Network Monitoring
  • Network Security
  • Spam and Email Filtering
  • Virtualization
  • Vulnerability Scanning

Event Landing Pages

    Blogs

    • ‘Tis the Season to Be Phished
    • “No More Ransom” is Leading the Fight Against Ransomware Abroad
    • 10 Questions to Ask Yourself When Evaluating Your IT
    • 3 Cool Technology-Related TV Shows
    • 3 Easy Actions Every Employee Can Do to Keep Their Computer Clean
    • 3 Gadgets that Any Technology Lover Would Appreciate
    • 3 Last-Minute Gifts For the Technology Lover in Your Life
    • 3 Questions You Need to Ask Your IT Service Provider
    • 3 Reasons Your Business Needs to Upgrade Its Technology
    • 3 Scary Things About Ransomware That You Should be Wary Of
    • 3 Strategies to Help Your Business Get Smarter
    • 3 Strategies to Win When You Have Too Much to Do
    • 3 Variables You Need to Consider for an Effective Digital Transformation
    • 3 Ways to Know if Your Company’s Better Off With a Private Cloud
    • 3 Ways You Can Turn Your Smartphone Into a Great Productivity Tool
    • 4 Best Practices for Implementing New Technology Solutions
    • 4 Common Pitfalls Holding Back Your Business’ Collaboration
    • 4 Reasons to Upgrade Your Antiquated Telephone Service
    • 4 Simple Rules for Good Passwords
    • 4 Steps to Better Solve Employee Burnout
    • 4 Tips to Help You Make Practical IT Decisions
    • 4 Types of Insider Threats to Watch For
    • 7 Critical Factors to Consider When Choosing IT Solutions
    • 7 Critical Mistakes to Avoid Concerning Your Network Security
    • A Basic Understanding of Informatics
    • A Good Disaster Recovery Strategy Can Save Your Business
    • A Look at Ransomware and What to Do About It
    • A Major Update to Windows 10 Is On the Horizon
    • A Router Password Repository Helps Keep Access Secure
    • A Solid Mobile Device Strategy Needs These 3 Components
    • A Trustworthy Recovery Strategy Requires a Few Things
    • After Another Year of Working from Home, How Does Remote Security Look?
    • AI Impacting the Healthcare Industry in Interesting Ways
    • AI Is Being Used By Hackers, Too
    • ALERT: Dangerous Zero-Day Threats Found in Recent Samsung Chipsets
    • ALERT: Your Business Needs to Take the Log4j Extremely Seriously
    • Almost 20% of Enterprise Windows Servers Lack Endpoint Protection… Does Yours?
    • Amazon Is Seeing Phishing Attacks Rise
    • An AI-Generated Piece of Art Has Created Quite the Controversy
    • An Introduction To Digital Transformation Strategies For Banking Institutions In 2020
    • Apple Releases Security Updates. Apply Them Today!
    • Are Employees Leaving Because They Might Have to Go Back to the Office?
    • Are Magnets Really Bad for a Computer?
    • Are Smart Speakers Spying on You?
    • Are We a Bad Influence on Our Artificially Intelligent Systems?
    • Are You Being Phished? 4 Things to Look Out For
    • Are You Doing Everything You Can to Make the Cloud Work for You ?
    • Are You Right for Software-as-a-Service?
    • Are Your Remote Workers Going to Compromise Your Network? Follow These 10 Suggestions to Reduce the Risk.
    • Artificial Intelligence Has Negatives and Positives
    • Ask a Tech: All Your Questions About Ransomware, Decrypted
    • Attract and Retain Employees with Solid IT
    • Automation Any Business Can Fit In Their Business Plan
    • Automation is Helping Build More Effective Businesses
    • Avoid these top 4 cyberthreats
    • Avoiding Scams Starts with Awareness
    • Basic Marketing Technologies to Help You Bring in Business
    • Be Prepared for Hardware Failure or Suffer the Consequences
    • Behind Employee Cybersecurity Efforts or Lack Thereof
    • Being Prepared Goes a Long Way Toward Averting Disaster
    • Best Practices in IT Decision Making
    • Boost Your Network’s Security with These 4 Tools
    • Boosting Employee Morale Isn’t as Hard as You Think
    • Broken Computer? Do These Things Before Taking It to the Shop
    • Build a Positive Digital Employee Experience
    • Build Efficiency Through Strategically-Implemented Processes
    • Build Great Habits with These 3 Tips
    • Bureaucracy In Your Business Can Ruin Efficiency
    • Burnout is a Bad Thing, Just Ask Your In-House IT Team
    • Burnout is a Serious Threat to Your Business’ Cybersecurity
    • Business Disasters Can Take Many Forms
    • Businesses Have Access to These 3 Powerful Communications Tools
    • Businesses Should Opt for Zero-Trust Policies when it Comes to IT
    • Careful! There’s an Infected Version of WhatsApp Out There
    • Cloud Hosting Services Offer More than Just Computing
    • Co-Management Can Take the Pressure Off
    • Common Security Issues on Mobile Devices
    • Communication Tools Your Business Needs to Consider
    • Companies Seeing a Lot of Turnover in Their IT Teams
    • Consider a Switch to VoIP this Year
    • Considerations That You Need to Make When Adding New Technologies
    • Could Zero-Trust Make the VPN Obsolete? Experts Suggest So
    • Creating a Powerful Backup Strategy
    • Creativity is Critically Important for a Successful IT Team
    • Cut Down on Your Technology Troubles
    • Cybercriminals Are Among Your Biggest Competition
    • Cybersecurity in the Financial Sector is Improving
    • Cybersecurity is Even More Important when Working Remotely
    • Cybersecurity Is Getting More Difficult as Phishing Becomes More Available
    • Dangerous Android App Masquerading as System Update
    • Data Backup is More Important Than You Think
    • Data Security Key to Staying HIPAA Compliant
    • Did You Know that Browser Cookies Come in Different Flavors?
    • Did You Mean to Type “LOL”? This Device Will Know If You Meant It!
    • Digital Data is Amazing, Part 1
    • Digital Data is Amazing, Part 2
    • Digital Monitoring? It’s Great and Helpful, Under the Right Circumstances
    • Do You Know How Much Your GLBA IT Audit Will Cost You?
    • Does My Michigan Community Bank or Credit Union Need Cloud Services?
    • Does Your Data Backup Comply with the 3-2-1 Rule
    • Don’t Be So Quick to Scan Every QR Code You See
    • Don’t Fall for the Google Business Profile Scam
    • Don’t Let Your IT Cause Business Failure
    • Don’t Let Your Old Technology Solutions Hold Your Company Back
    • E-Waste is a Massive Problem that We Can All Help Fix
    • Educators Having Increased Exposure to Ransomware
    • Emotions Can Run High in the Workplace… Here’s How to Manage Yours
    • Every Business Now Needs to Be Mindful of IoT
    • Everything You Need to Know About Windows 8.1 End of Life
    • Evolution of Cybersecurity Tools and Strategies
    • Experts Can Make or Break a Technology Implementation
    • Explaining the Metaverse
    • Explaining the Pen Test and Its Benefits
    • Explaining VoIP and Its Immense Benefits
    • Exploring Some Ways Windows 11 Boosts Productivity
    • Facebook Phishing Is a Real Problem
    • Fledgling Smartphone Market Sees Decline in Innovation
    • Four IT Mistakes that Your Small Business Can’t Afford to Make
    • Four Problems that Can Undermine an IT Project
    • Get Busy Setting Your Business Up for Success
    • Get More Efficient with Technology and Shifts in Strategy
    • Get the Operational Freedom You Seek Through Automation
    • Get Your Data Protected with BDR
    • Hackers Use the Pandemic to Send Out Phishing Threats
    • Has Innovation Resorted to Gimmicks?
    • Have an Old Google Account? Google Might Delete It Soon
    • Have You Been Targeted By Phishing Attacks? Chances Are You Have
    • Here Are 3 Keys to Building a Thorough IT Support Strategy
    • Hosted VoIP Brings a Lot of Benefits
    • How a Firewall Protects Your Data From the Worst of the Web
    • How Cloud Solutions Fit into Businesses Today
    • How Do Hardware Shortages Affect Business Decisions
    • How do Managed Services Stack Up to Break/Fix Services in Price?
    • How Does Streaming Technology Work?
    • How Internet Speeds Have Changed
    • How Much Is Access to Your Network Worth to a Hacker?
    • How Much Time Can AI Save Your Business?
    • How Schofield’s Laws of Computing Can Benefit Your Business’ Security
    • How Secure are Mobile Apps from the App Store?
    • How Smart is Your Smart Technology When It Comes to Network Security?
    • How Technology Helps You Build a Better Business
    • How to Choose a Smartphone Now that Innovation has Slowed
    • How To Design a Workspace with Productivity in Mind
    • How to Determine Which Cloud Solutions Are Right for Your Business
    • How to Get Back Into Your Multi-Factor Authentication Account
    • How to Get Cybersecurity Through to Your Staff
    • How to Get Get More Done and Feel Better About It
    • How to Get Value from Your Technology Investments
    • How to Go About Finding the Right Technology for Your Needs
    • How to Help Keep Your Mobile Devices Kicking for Longer
    • How to Implement an Effective BYOD Policy
    • How to Keep Rapid Growth From Hurting Your Business
    • How to Manage a Hot Desking Workplace
    • How to Manage Google Drive’s Connected Applications
    • How to Properly Manage Business Software
    • How to Safely Adjust Your IT Budget in Tough Times
    • How to Secure Your IoT Devices at Home
    • How to Set Up Two-Factor Authentication for Your Google, Apple, and Microsoft Accounts
    • How to Solve Procedural Problems in Your Business
    • How to Tell Your Business’ Technology Needs an Upgrade
    • How Will the Regulations Surrounding the Cloud Continue Shifting?
    • How You Can Make Sense of Your Priorities with an Eisenhower Matrix
    • How You Spend Your Business’ Money Matters
    • Huge Data Leak Could Have Been Prevented with Proper Configurations
    • Hundreds of Applications Could Potentially Expose Data Through Basic Errors
    • Identifying the Most Valuable Technology for Your Business
    • Innovations in Manufacturing Tech
    • Innovative Tools You Might Just See in the Workplace Before Long
    • Internet Explorer is Dead, Long Live Microsoft Edge?
    • Introducing No Code Tools and How They Can Work for You
    • iPhone Scam Can Pop Up and Cause You Trouble
    • Is AI an Existential Threat to Humanity? The Answer: Maybe
    • Is Cyber Insurance Worth It? (Spoiler Alert: It Is)
    • Is Outsourcing HR Right for Your Business?
    • Is Remote Work Really That Much Greener, In the Long Run?
    • Is the Cloud Over Complicating Your Business?
    • Is Virtual Reality an Option for Your Business?
    • Is Your PC Ready for Windows 11?
    • Is Your Team Becoming Desensitized to Your Business’ Cybersecurity Precautions?
    • IT Services For Community Banks
    • IT Services For Credit Unions
    • It’s Time to Fight Malware with AI
    • Keep Your Eyes Peeled for These Potential Security Threats
    • Keeping Your Data Stored Centrally Offers Significant Benefits
    • Knowledgeable IT Technicians Present Value for SMBs
    • Let’s Dork Out Over How Far We’ve Come with Mobile Devices
    • Let’s Take a Look at 2021’s Best Smartphones: Value Phones
    • Life Lessons that Can Also Apply to your Business IT
    • Looking at AI’s Runaway Advancement
    • Looking In at the Benefits of Remotely Monitoring Your Business’ Technology
    • Maintain and Support Your Technology Before Your Employees Take Matters Into Their Own Hands
    • Maintenance is More than Computer Repair
    • Major Technology Company Barracuda Suffers Zero-Day Vulnerability
    • Many Businesses Have Found the Value in Hybrid Operations, You Might Too
    • Michigan State IT Examiner Joins RedRock Information Security
    • Microsoft is Sending Mixed Signals About Remote Work
    • Microsoft Warns Against Password Spraying
    • Migrating Data? Budget in Evaluating End Result
    • Mobile Device Management is Challenging in Today’s Remote Work Environment
    • Mobile Management Is More Crucial than Ever
    • New Study Addresses the Challenges of Readjusting to the Office Environment
    • New Study Finds That Paying Off Your Ransomware Attackers Has Some Severe Consequences
    • No Matter Your Needs, Managed IT Can Be Beneficial for Your Business
    • One Hidden Benefit of Managed IT Services
    • Optimism Generally Produces Better Results
    • Outlining the Usefulness of the Password Manager App
    • Outsourcing Technology Services – What’s the Risk?
    • Over 90% of Businesses Use Cloud Computing, and for Good Reason
    • Password Managers Have Built-In Value
    • Phishing Gets Around Normal Cybersecurity Protection
    • Phishing Training is a Critical Component of Any Security Strategy
    • Privacy Engineering is the Key to a More Secure Future
    • Proactive Remote Maintenance is the Key to Success Long-Term
    • Protecting Digital Assets a Must for Modern Businesses
    • Ransomware Costs May Surprise You
    • RedRock Resolves IT Vulnerabilities For Michigan-Based Credit Union
    • Remote Collaboration Demands Additional Security
    • Remote or In-House, Keeping Your Staff Upbeat Is Essential for Productivity
    • Remote Policies That Do (and Don’t) Transition Well to In-House Operations
    • Remote Work Is More Normal Now that It Has Ever Been
    • Remote Work Needs to Be Secure Work…Here’s What You Can Do
    • Scams Work More than We’d Like to Admit
    • Secure Your Data with Backup and Disaster Recovery
    • Security Doesn’t Always Have to Be a Grind
    • Setting Up One of the Most Important Devices in Your Business
    • Should You Archive That Email or Delete It?
    • Should You Invest in New Technology Before You Get Priced Out?
    • Small Businesses are Finding Places to Fit In Automation
    • Smart Technology Is Changing Small Business
    • Smartphones Can Have a Legitimate Purpose in the Workplace
    • So, What Can the Cloud Do For Your Business?
    • Social Media has Emerged as a Transcendent Technology for Businesses
    • Software as a Service Works Because of These 3 Benefits
    • Software Management Doesn’t Have to Be Hard
    • Solid Communications is Imperative for the Modern Business
    • Sometimes, Business Growth Requires You to Be a Bit Uncomfortable
    • Speed up Business with eSignatures
    • Spending More Time on Your Cybersecurity Has More Benefits than You May Think
    • Steps You Can Take to Maximize Work-from-Home Productivity
    • Steps You Need to Take If You Are the Victim of a Network Breach
    • Strategies for Training on New Technology
    • Supply Chain Management and the Growing Need for Logistics
    • System Failure Is a Big Risk that Every Business Takes On
    • System upgrades can be painful. But are they actually necessary?
    • Technology Has Its Own Pain Points
    • Technology is the Future of Infrastructure
    • Technology Is the Gift that Keeps on Giving
    • That False Sense of Security is Going to Bite You
    • The As-a-Service Government is Improving Public Services
    • The Best Smartphones Right Now – Flagships
    • The Big Difference Between Patches and Updates
    • The Biggest Cybersecurity Problems Small Businesses Have in 2021
    • The Blockchain is a Fascinating Technology with a Lot of Potential
    • The CHIPS Act Looks to Help Push Technology Forward
    • The Cloud is Only Helpful if It’s Secure
    • The Emergence of Social Media has Changed the Game for Businesses
    • The Emergence of the CISO
    • The False Dichotomy of Smart Technologies
    • The FBI is Looking to Talk to Businesses Affected by Ransomware
    • The Fundamental IT Defense Plan
    • The Geek Squad Phishing Scam is Costing People Lots of Money
    • The Global Chip Shortage a Real Problem for Many
    • The Haunting of North Shore Software
    • The Highest-End Smartphones Right Now – Foldables
    • The IoT Is Helping Business Get Smarter
    • The IT Guy Has Changed
    • The LinkedIn Breach Exposes Nearly 700 Million People
    • The Network Bottleneck Can Sap Productivity
    • The Pitfalls of Cloud Computing and How to Overcome Them
    • The Pros and Cons of a Digital Dollar
    • The Reasons Why Hackers Can’t Keep Their Hands Off Healthcare Data
    • The Right Software Can Remove Productivity Roadblocks
    • The Rubber Ducky Hacking Tool is Back
    • The Technology Behind Streaming Services Is Pretty Impressive
    • There are Benefits from Aggressively Spending on Technology
    • There Are Serious Benefits to Setting Up a Knowledge Base
    • These Link Checking Tools Might Save Your Bacon
    • Think Before You Click – Don’t Simply Trust Emails
    • Three Ways to Help Your IT Budget Go Further
    • Three Ways You Can Make Technology Work for You
    • Tighten Up Your Network Security with Superior Access Control
    • Tip of the Week: 3 Steps to Avoiding a Ransomware Infection
    • Tip of the Week: 3 Technology Tips Anyone Can Use
    • Tip of the Week: 3 Things You Can Do to Keep Your Business’ IT More Secure
    • Tip of the Week: Building Strong Password Practices
    • Tip of the Week: Easily Close Browser Tabs
    • Tip of the Week: Easy Windows 10 Screenshots
    • Tip of the Week: Enable or Disable Startup Programs in Windows 10
    • Tip of the Week: Ensuring Effective Collaboration
    • Tip of the Week: Ergonomics Tips For the At-Home Worker
    • Tip of the Week: Getting the Most Out of Your Cybersecurity Budget
    • Tip of the Week: How an Android User Can FaceTime, Sort Of
    • Tip of the Week: How to Clear Your Browser Cache in Android OS
    • Tip of the Week: How to Create an Email Group in Gmail
    • Tip of the Week: How to Get Your Remote Workers to Be More Productive
    • Tip of the Week: How to Manage App Permissions in Android
    • Tip of the Week: How to Properly Inventory Your Technology
    • Tip of the Week: How to Spot Various Forms of Phishing
    • Tip of the Week: Import Your Bookmarks in Chrome
    • Tip of the Week: Improving Your Relationship With Your Employees
    • Tip of the Week: Instant Messaging Strategies that Work
    • Tip of the Week: Keep Your Computer Working Effectively with These 5 Tips
    • Tip of the Week: Maneuvering Around Microsoft Teams
    • Tip of the Week: Modernizing Your Legacy Systems
    • Tip of the Week: Reopening Closed Chrome Tabs and Windows
    • Tip of the Week: Saving Time in Microsoft Office
    • Tip of the Week: Setting Your Out-of-Office Message in Outlook
    • Tip of the Week: Sharing Web Pages Between Chrome and Android
    • Tip of the Week: Steps You Can Take to Ensure Your Files are Secure
    • Tip of the Week: Stop Overworking from Home
    • Tip of the Week: Using People Graph in Microsoft Excel
    • Tips to Help You Determine How Much Bandwidth You Need
    • Tomorrow is World Password Day (But Passwords Are Just Half the Battle)
    • Traveling During the Holidays? Keep These Tips in Mind
    • Trends That Will Define The Banking Sector In 2020
    • Turns Out There is a Trend for Cyberattacks Over Holiday Breaks and Weekends
    • Understanding the Costs Outlined in Your Technology Budget
    • Use the Cloud for Productivity
    • Using Windows PowerToys Might Give You the Edge You Need
    • Using Your Voice to Type in Microsoft Word
    • Voice over Internet Protocol is a Solid Business Tool
    • VoIP Can Make Communications Easier
    • VoIP Delivers for Businesses with These Features
    • VoIP Features Your Business Should Know About
    • Want to Learn How to Steal a Password? It’s Easier Than You Think
    • What a Firewall Does (and Doesn’t) Keep Out of Your Network
    • What are My Options for Connecting a Second Monitor?
    • What Are You Going to Do When Disaster Strikes?
    • What Can Businesses Expect in 2023?
    • What Does It Mean to Be Adept at Cybersecurity?
    • What Exactly is an NFT?
    • What Exactly is Personally Identifiable Information?
    • What Happens When You Get Ransomware?
    • What is a Botnet, and Why Is It Dangerous?
    • What is a Security Operations Center?
    • What is a Zero-Day Exploit?
    • What is the Cloud and What Can It Do for Your Business?
    • What Search Engine is Truly the Best, Part 1
    • What Search Engine is Truly the Best, Part 2
    • What Should be Expected from a CIO in the Coming Years?
    • What Software Does Your Business Need?
    • What the Heck is Patch Tuesday, Anyways?
    • What Today’s Business Leaders Need to Know About IT
    • What You Need to Know About the Internet of Things
    • What You Need to Know to Avoid Phishing Attacks
    • What You Need to Know to Get Through a Data Disaster
    • What Your Organization Needs to Know About the FTC Safeguard Rule
    • What’s Going on With the Microprocessor Shortages?
    • What’s the Line Between a Security Breach, and a Data Breach?
    • What’s Your Business Continuity Strategy for 2023?
    • When It Comes to Internet Security Awareness, It’s Best to Start Early
    • Where Does Your Recycled Technology Go?
    • Who Handles the IT at Your Company? Are They Doing These Critical Tasks?
    • Who’s Behind the Wheel of Your Business’ Technology?
    • Who’s Really Hurt the Most by Card Skimmers?
    • Why a Zero-Trust Policy Might Be Appropriate for Your Business
    • Why All Businesses Should Implement a Virtual Private Network
    • Why IT Spending is Bucking Current Economic Trends
    • Why It’s a Bad Idea to Use Your Work Email for Personal Accounts
    • Why Phishing Attacks Such a Huge Risk for Your Business
    • Why Should You Bother with Data Backup?
    • Why Solid Project Management is So Important
    • Why You Should Pay Attention to the Court’s Ruling in Capital One’s Case 
    • With Prime Days, Old Tech Can Become a Problem
    • Won’t More IT Security Just Slow Me Down?
    • Would You Be Interested In Having A Former State Examiner Help You Prepare For Your Next IT Exam?
    • Yes, Even Your USB Drives Should Be Secured
    • Yes, You Can Outsource Hacking
    • You Aren’t Wrong When You Say IT is Complicated
    • You Can’t Afford to Ignore Your Data Backup
    • You Can’t Go Wrong with the Value Managed IT Services Bring
    • You Gain Major Benefits from Our Extensive Experience
    • You May Be Surprised How Work Relationships Benefit from Remote Work
    • You Need Cost-Effective and Reliable Ways to Manage Your Technology
    • You Need to Take Your Cybersecurity Seriously
    • You’re Not Too Small for Enterprise-Level Software, But You are Too Big for Consumer-Based Software
    • You’ve Lost Your Phone, What Do You Do Now?
    • Your (Far From Comprehensive) Guide to Google’s Secrets and Easter Eggs
    • Your Business Could Use Managed IT Services
    • Your Business Needs to Consider Implementing a Refresh Schedule
    • Your guide to keeping your organization safe with technology
    • Your Guide to the Modern Varieties of Cybercriminal

    logo

    RedRock's Facebook page   RedRock's LinkedIn page

    RedRock Information Security LLC

    1101 40th St SE, Grand Rapids, MI 49508

    P: 616.534.1500 | Email us | Privacy Policy | Website Accessibility

    Copyright 2021 RedRock Information Security LLC

    STAY UP TO DATE ON THE LATEST TECH NEWS

    • We respect your privacy. We'll NEVER sell, rent or share your email address.
    • This field is for validation purposes and should be left unchanged.

    We respect your privacy. We’ll NEVER sell, rent or share your email address.

    Scroll to top