Passwords are an essential part to your businesses cybersafety. If, like the rest of us, you have dozens of passwords to remember, you might take shortcuts. Taking advantage of this type of attitude is one way bad guys access your passwords. Continue reading
Information security is on all business’ radar these days. Data drives so much of what we do. Looking to contain the risks, many sectors have established IT compliance regulations. Whether you legally have to meet a standard or not, don’t overlook these common areas of concern. Continue reading
Due diligence is about taking care and being cautious in doing business. As technology pervades most areas of business people forget that due diligence also extends to how you manage your technology! You may think you are immune to a data breach or cyberattack, but cybercriminals can target you regardless of your business size or industry sector. Continue reading
You know you need to secure your data, but how? This article examines the different benefits of both options. Continue reading
Every Internet user should already know that the internet has many people looking to exploit the Web for ill intent. These people congregate on the Dark Web and small businesses need to understand what it is and what the risks are. Continue reading
Why just passwords are not good enough?
As you know, Microsoft regularly release new options and new security features as part of their Office 365 platform.
As part of their focus on security, they highly recommend that all users implement 2FA or MFA on all their O365 accounts. Continue reading
“Your computer has a virus.” Such a dreaded phrase!! With a “human” virus we can feel awful and miss work but when a virus hits our computers, we can lose valuable information and be vulnerable to attack. Continue reading
When we accidentally delete something, it feels like the end of the world. If a client file or your latest proposal is deleted, you may have to start again. Yet deleting files may not as permanent as many think. When it comes to destroying data properly, you will need to take a more thorough approach. Continue reading
You might think that your business is going to be fine if a single device goes down. After all, there are other devices your staff can use and your entire systems are not going to fall like dominoes. Or will it? Get rid of single points of failure to make sure that one vulnerability does not take down your entire network. Continue reading
There are many common myths about computers. In this blog article we debunk 5 common urban myths. Continue reading