The CKT Blog

Check out our blog for the latest updates and news on cybersecurity and information technology.

Private Cloud Makes a Comeback in the Hybrid Era

For years, conversations about digital transformation have primarily focused on public cloud providers. Businesses of all sizes lean on cloud giants like Microsoft Azure, Google Cloud, and AWS for the scalability, speed, ...

HP Pulls Update After Breaking Microsoft Security Tools

If your business uses HP AI PCs, a recent HP OneAgent update may have made things difficult for your IT team. The company silently rolled out an enhancement, but instead of improving ...

Top 7 Technology Shifts Powering Businesses in 2026

A practical guide to keep your team ahead and your technology working with you. At Common Knowledge Technology, we believe IT should ...

Why CKT Chooses Cove Cloud Backup: Protecting M365, Servers, and Workstations from the Unexpected

You’ve moved to Microsoft 365, confident your email, files, and company data are secure in the cloud. It’s a modern solution, so ...

How Hackers Are Infiltrating Companies by Posing as New Hires

Imagine a new employee, vetted by your HR team, equipped with login credentials, and granted access to your network. They seem eager, ...

Deploy 24/7 Vulnerability Scan Across All Devices

Cyber threats don’t operate on a schedule, and neither should your security. Every device connected to your network, laptops, servers, routers, and ...

Surviving October’s Cloud Chaos; What AWS, Azure, and Cloudflare Outages Teach SMBs

Picture this: It’s Monday morning, and your small structural engineering firm, your lifeline for meeting the deadline on a major municipal bridge ...

Prosper Data Breach Exposes User Information

Do you think your business is safe from a cyberattack because it’s not a huge technology company? Think again. The recent Prosper data breach has put millions of people and companies at ...

Cutting Everyday Inefficiencies With Smart Business Technology

Even the most well-run companies have a few inefficiencies here and there, many of which are hiding in plain sight. Maybe it’s that clunky software that takes forever to load, or the ...

Hackers Are Exploiting OAuth Apps in New Attacks

Cybersecurity threats keep getting smarter, and one of the latest can thwart the tools that we all use to protect our applications. Researchers at Proofpoint have uncovered a sophisticated new wave of ...