Open Ticket
button_chat_navy
button_email_navy
button_call_navy
button_remote-support_navy
button_account-portal_navy

November 2018

Ransomware emails: How to identify

By | 2018-11-14T09:42:55+00:00 November 14th, 2018|Uncategorized|

  Ransomware emails: How to identify and steer clear of them Ransomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs, shipping giants, etc., have all been victims of ransomware attacks. Your business could be too! Did you know that emails are one of the most common gateways for ransomware to get [...]

How good is your password

By | 2018-11-07T09:29:30+00:00 November 7th, 2018|Uncategorized|

  How good is your password? Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related to passwords that you can follow to ensure passwords are not your weakest link.  Avoid sequences and repetitions: How many times have you used passwords like [...]

October 2018

Think you are too small

By | 2018-10-31T10:27:36+00:00 October 31st, 2018|Uncategorized|

  Think you are too small to be targeted by a cybercriminal? Think again. When I meet with clients, especially SMBs, I often hear them say that they feel their business is too insignificant to be a target of cyber-criminals. Why would someone go after my business when there are bigger ones out there, making more money? [...]

Keeping your data safe: Access Control

By | 2018-10-24T10:23:54+00:00 October 24th, 2018|Uncategorized|

  Keeping your data safe: Access Control Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your data or hold it hostage, but also inflict irreversible damage on your brand and business. As a norm, most businesses these days do invest in anti-virus/cybersecurity systems. But, is that really enough? [...]

September 2018

Cyberattacks and the vulnerability of the small business

By | 2018-09-13T18:35:42+00:00 September 13th, 2018|Uncategorized|

  Cyberattacks and the vulnerability of the small business You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of [...]

Denial is not a solution: Something you owe your customers and your employees

By | 2018-09-06T18:23:13+00:00 September 6th, 2018|Uncategorized|

  Denial is not a solution: Something you owe your customers and your employees Why do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one of those “probably won’t happen--at least in the foreseeable future, and I‘ve got more interesting things [...]

August 2018

Limited investment capital and planning for trouble

By | 2018-08-30T18:19:47+00:00 August 30th, 2018|Uncategorized|

  Limited investment capital and planning for trouble Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms often fail to address these issues because they lack the necessary capital [...]

Data Protection Laws and PIIs

By | 2018-08-23T18:10:53+00:00 August 23rd, 2018|Uncategorized|

  Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be used to distinguish or trace an individual’s identity, either [...]

Are you subject to Data Protection laws?

By | 2018-08-16T18:09:10+00:00 August 16th, 2018|Uncategorized|

  Are you subject to Data Protection laws? This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the securing of covered data, and may also require notification of victims [...]