Cybersecurity
Email scams are a significant risk for small businesses; ignoring them can have devastating consequences. We’re sharing a cautionary tale about a real-life email scam targeting a small business and how they ultimately avoided the fallout.
Read MoreThe year 2022 is bringing yet another wave of challenges as we continue our parade of working from the office, working from home, or working while travelling. Now, many of us have been doing this for quite a while, thanks to our laptops, docks, home Wi-Fi etc. We are becoming increasingly comfortable with this level…
Read MoreEmail is not secure. It has never been secure, and little has changed since its invention by Ray Tomlinson back in 1971. Fast forward to 2022 and most business leaders and end users are aware of the risks of email phishing. Most also know that it is a primary way for hackers to gain access to sensitive company data, however,…
Read MoreIt takes just a couple of clicks to compromise your entire IT network. That’s it. Breaching your security can be so easy. Our advice to you is to shore up some easy to tackle security best practices. You do not have to be a victim. Email phishing is a tactic employed by hackers whereby they send an unsolicited email pretending to be someone…
Read MoreWhile most medium-size construction operations are deeply reliant on technology, investment remains low compared to other industries. Over the years, we gained insight into some of the common problems with regards to IT that plague the sector, and we have some simple and easy to implement solutions to help navigate these challenges. IT is perceived as a general expense Technology needs…
Read MoreIn today’s modern workplaces, employees are accessing more and more company resources from remote locations creating a greater need for enhanced security. In response to these workplace shifts, Microsoft added Conditional Access to business premium licensing in 2019. This allowed businesses with fewer than 300 users to gain more comprehensive protection of their company data…
Read MoreLearn the importance of CIS control and cyber defense and the role they play in the success of your network infrastructure. We share a lot about security. We do this to protect your company, network, data, and most importantly, your clients from cyber threats. We also do this because businesses today require a layered approach…
Read MoreDuring the past year, we have seen a significant increase in the number of email phishing scams. Vancouver Island organizations are being targeted and business leaders are now coming to terms with the costly consequences of poor password management coupled with lax cybersecurity practices and policies. Multi-factor authentication (MFA) simply put is a method by which a user verifies his…
Read MoreOn June 22nd, a user of a popular hacker forum, advertised for sale data from 700 million LinkedIn users. The user posted a sample of the data that includes 1 million LinkedIn users. The sample was found to contain the following information: Email addresses Full names Phone numbers Physical addresses Geolocation records LinkedIn username and…
Read MoreWhat is a security champion? The concept of a security champion (SC) first emerged out of the developer community. At that time, security champions were seen as the professionals that could bridge the gap between application development and security. In recent years, we have seen this role emerge in small-to-medium-sized businesses. A security champion identifies…
Read More