Blog
Get Familiar with the Cyber Basics
At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and Kaseya breaches as well as high-profile attacks on the Colonial Pipeline and other critical infrastructure. Furthermore, as has been…
Read MoreOffice 365 is becoming Microsoft 365
New name, same great value, same price Don’t worry—you don’t need to do a thing. Your product services, apps, and features will stay the same, along with the price. Your subscription name will update automatically in the admin center and your monthly invoices / billing statements on or after April 21, 2020. Office 365 Business…
Read MoreNeed to Implement New IT Policies? Now is the time.
A fresh start and a new year is the perfect time to implement new policies in your business, including IT policies. Odds are, if you’re thinking about implementing a new policy, you’ve been thinking about it for a while; and it’s probably caused problems with your employees. Actually creating and implementing a new policy can…
Read MoreBusiness Continuity Planning
At any time, disaster could strike your business. So why aren’t you focusing on backing up your data? If your accounting, contact, and customer information is important to your business (which, of course it is), you need to keep track of your backups and schedule them frequently. Not only do you need to perform backups,…
Read MoreRansomware Emails: How to Identify and Steer Clear of Them
Ransomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs, shipping giants, etc., have all been victims of ransomware attacks. Your business could be too! Did you know that emails are one of the most common gateways for ransomware to get into your systems? In this blog, we tell you…
Read MoreHow Good is Your Password?
Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related to passwords that you can follow to ensure passwords are not your weakest link. Avoid sequences and repetitions: How many times have you used passwords like dollar12345 or $$$BobMckinley. Passwords…
Read MoreThink You are Too Small to be Targeted by a Cyber Criminal?
When I meet with clients, especially SMBs, I often hear them say that they feel their business is too insignificant to be a target of cyber-criminals. Why would someone go after my business when there are bigger ones out there, making more money? Here are a few reasons why. Because you think so – The…
Read MoreKeeping Your Data Safe: Access Control
Cyber attacks are commonplace today. Malware such as viruses, worms, and more recently ransomware not only corrupt your data or hold it hostage, but also inflict irreversible damage on your brand and business. As a norm, most businesses these days to invest in anti-virus/cybersecurity systems. But, is that really enough? The answer is–NO. Because they…
Read MoreSmaller Firms Less Likely to Keep Up to Date on the Basics That Protect Them
On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be less likely to be able to make sure their software is consistently updated to reflect any patches released by the product’s maker. This simple oversight, deliberate or not, is a major…
Read MoreCyberattacks and The Vulnerability of The Small Business
You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of the cybercrime is occurring. What any business,…
Read More