Petra Technologies, Inc.'s Blog


(503) 363-2693 4.9/5 based on 7 Reviews
Petra Care Standard Plan
The size of your business can be a big factor when it comes to finding the right managed services provider; smaller organizations typically need a lighter touch, while larger businesses often require…

(503) 363-2693 4.9/5 based on 7 Reviews
Petra Care Connect Plan
For businesses that don’t have a traditional server or have remote staff scattered in different locations, comprehensive IT services can be a little more tricky. That’s why we created the Petr…

(503) 363-2693 4.9/5 based on 7 Reviews
Petra Co-Managed Plan
When it comes to choosing a managed services provider, there are a lot of factors to consider. What size is your business? Do you have an in-house IT staff member or team? How much support or managem…

(503) 363-2693 4.9/5 based on 7 Reviews
"Silent Quitting"
Have you ever noticed a coworker gradually losing motivation and engagement, eventually leading to them disconnecting from the company and doing the bare minimum? This phenomenon, known as "silent qu…

(503) 363-2693 4.9/5 based on 7 Reviews
Deepfakes-as-a-Service
"Deepfakes" are synthetic, AI-generated images or videos that replace existing subjects with someone else's likeness—and look realistic enough to fool people into thinking they're real. Deepfakes-a…

(503) 363-2693 4.9/5 based on 7 Reviews
Real Story Ransomware Attack: MercyOne in Iowa
The health care sector has proven to be a major target for hackers to deploy ransomware and steal data. One recent cyberattack took place earlier this month and caused hospital-wide outages at one of…

(503) 363-2693 4.9/5 based on 7 Reviews
SonicWall 2022 Mid-Year Cyber Threat Report
The mid-year update of the SonicWall 2022 Cyber Threat Report is here, and it is packed with new and updated information about global cyber threats, rising cyberattacks, and never-before-seen malware…

(503) 363-2693 4.9/5 based on 7 Reviews
Connecting "Soft Costs" and Cybersecurity Insurance
It’s no secret that having an internal tech person on staff is less effective than working with a Managed Service Provider (MSP). In many cases, important cybersecurity tasks fall through the crack…

(503) 363-2693 4.9/5 based on 7 Reviews
Cyber Hygiene
We know that maintaining personal hygiene is important to stop the spread of disease and minimize health problems such as cavities, but what does it mean to have good cyber hygiene? The term "cybe…

(503) 363-2693 4.9/5 based on 7 Reviews