Isolate Yourself from the Coronavirus Scams!

Carona Virus Scams

Scammers jump on any of the latest happenings in the world and are always looking for opportunities, and at the moment they are targeting the coronavirus (aka COVID-19). This article outlines what you need to watch out for and how to stay cyber safe. Continue reading

Are You Protected Against Leakware?

Leakware or extortionware

You should have heard about ransomware by now. Cyber-criminals access and encrypt your data and you have to pay a “ransom” for the key to unlock your data. If you have a backup you can revert to that and forget about the hackers threats. Leakware (also known as extortionware) is similar, but now the bad actors are threatening to post your confidential information online if you don’t pay up. Continue reading

Do Not Get Hooked By a Whaling Attack

Whaling Attack

The executives of your company are the big fish in your sea and cyber-criminals think of them as whales. In fact, whaling is a new cyber-security threat targeting your C-suite level staff. Continue reading

Security or Flexibility: Which Matters More?

Security versus Flexibility?

Business is all about making tough choices. One such choice is whether to value IT security or business flexibility more. Unfortunately, you can not have the best of both at the same time. Continue reading

What is a Firewall and Why Do They Matter?

Hearing “firewall” in the context of computing can be confusing.  This blog article aims to explain what a firewall is and how it will benefit your business. Continue reading

5 Ways to Enhance Strong Network Security for your Business

Even with the constant development of new and powerful security measures, there are still many businesses that fall victim to the wave of cybercrimes floating around the internet today. Continue reading

How the Bad Guys Get Your Passwords

Password thiefPasswords are an essential part to your businesses cybersafety. If, like the rest of us, you have dozens of passwords to remember, you might take shortcuts. Taking advantage of this type of attitude is one way bad guys access your passwords. Continue reading

Compliance Issues Your Business Might Be Missing

ComplianceInformation security is on all business’ radar these days. Data drives so much of what we do. Looking to contain the risks, many sectors have established IT compliance regulations. Whether you legally have to meet a standard or not, don’t overlook these common areas of concern. Continue reading

Are You Doing Your IT Due Diligence?

Due DiligenceDue diligence is about taking care and being cautious in doing business. As technology pervades most areas of business people forget that due diligence also extends to how you manage your technology! You may think you are immune to a data breach or cyberattack, but cybercriminals can target you regardless of your business size or industry sector. Continue reading

O365 – Why you need to implement 2FA

Unknown threats

Why just passwords are not good enough?

As you know, Microsoft regularly release new options and new security features as part of their Office 365 platform.

As part of their focus on security, they highly recommend that all users implement 2FA or MFA on all their O365 accounts. Continue reading