Passwords are an essential part to your businesses cybersafety. If, like the rest of us, you have dozens of passwords to remember, you might take shortcuts. Taking advantage of this type of attitude is one way bad guys access your passwords. Continue reading
Information security is on all business’ radar these days. Data drives so much of what we do. Looking to contain the risks, many sectors have established IT compliance regulations. Whether you legally have to meet a standard or not, don’t overlook these common areas of concern. Continue reading
Due diligence is about taking care and being cautious in doing business. As technology pervades most areas of business people forget that due diligence also extends to how you manage your technology! You may think you are immune to a data breach or cyberattack, but cybercriminals can target you regardless of your business size or industry sector. Continue reading
Why just passwords are not good enough?
As you know, Microsoft regularly release new options and new security features as part of their Office 365 platform.
As part of their focus on security, they highly recommend that all users implement 2FA or MFA on all their O365 accounts. Continue reading
“Your computer has a virus.” Such a dreaded phrase!! With a “human” virus we can feel awful and miss work but when a virus hits our computers, we can lose valuable information and be vulnerable to attack. Continue reading
The phrase “island hopping” conjures up positive images of holidays, sandy beaches and cruises. But cybercriminals have given the term a new, less pleasant spin. Continue reading
Cybercrime has hundreds of millions of victims if not more! Two-thirds of people online have experienced personal information theft or compromise. A 2018 McAfee Security study suggested that represents more than 2 billion individuals! Continue reading
Most Apple Mac owners believe their computers are immune to viruses and malware. Even Apple has run advertising campaigns promising that its computers “don’t get viruses”. Those who have owned a Mac for years, decades even, are particularly prone to believing that it indeed the case – after all, nothing has happened to them yet! Regrettably, Macs do get viruses and the threat is getting even larger. Continue reading
Security and privacy are at the very top of our priorities when considering your business IT needs. Major data leaks are now in the news on a daily basis and these leaks costs the companies thousands if not millions of dollars. Our number one goal is to make sure our clients and their businesses are kept out of danger to the best of our abilities.
More and more people are implementing smart homes and including devices such as Google Home and Amazon Alexa. Android and iOS devices also include assistant technology. Smart home assistants can help users by searching online, starting phone calls, ordering groceries, playing music and turning on devices all with a single spoken command.