A new and aggressive phishing campaign has been spreading rapidly since January. The message contains a document with macro that will install a malicious remote access tool on the user’s computer. If you receive a document in a message that looks like the one to...
The way we work is changing. Our work today is much more team-based and collaborative with many more remote workers than previous generations. Because of these changes, we need tools that “work the way we do.” Microsoft Teams is the hub for teamwork, where...
Spear phishing is alive and well and hackers are targeting our business community in sleepy Victoria, BC. Hackers lurk in the shadows targeting local businesses. They watch and wait for the most opportune time to prey upon them. Here’s one notable Victoria incident...
Encryption transforms data into a locked format that cannot be read without a key. You can encrypt stored data, data en route for communications and devices that may be used for storage. To unlock encrypted data, you need a key. Encryption is the best defense against...
74% of data breaches involved privileged credential abuse. Centrify Who has access to private data at your business? What policies do you have in place for ensuring accountability? When it comes to user access, every organization needs to: Limit privileged access....