Cybersecurity

A Real-Life Email Scam

January 7, 2024

Email scams are a significant risk for small businesses; ignoring them can have devastating consequences. We’re sharing a cautionary tale about a real-life email scam targeting a small business and how they ultimately avoided the fallout.

Read More

Working from anywhere, safely

February 2, 2022

The year 2022 is bringing yet another wave of challenges as we continue our parade of working from the office, working from home, or working while travelling. Now, many of us have been doing this for quite a while, thanks to our laptops, docks, home Wi-Fi etc. We are becoming increasingly comfortable with this level…

Read More

Email Security

January 6, 2022

Email is not secure. It has never been secure, and little has changed since its invention by Ray Tomlinson back in 1971.   Fast forward to 2022 and most business leaders and end users are aware of the risks of email phishing. Most also know that it is a primary way for hackers to gain access to sensitive company data, however,…

Read More

How to spot an email phishing scam

December 21, 2021

It takes just a couple of clicks to compromise your entire IT network. That’s it. Breaching your security can be so easy. Our advice to you is to shore up some easy to tackle security best practices.  You do not have to be a victim.  Email phishing is a tactic employed by hackers whereby they send an unsolicited email pretending to be someone…

Read More

Ransomware targeting construction firms

December 15, 2021

While most medium-size construction operations are deeply reliant on technology, investment remains low compared to other industries. Over the years, we gained insight into some of the common problems with regards to IT that plague the sector, and we have some simple and easy to implement solutions to help navigate these challenges.  IT is perceived as a general expense   Technology needs…

Read More

Conditional Access

October 12, 2021

In today’s modern workplaces, employees are accessing more and more company resources from remote locations creating a greater need for enhanced security. In response to these workplace shifts, Microsoft added Conditional Access to business premium licensing in 2019. This allowed businesses with fewer than 300 users to gain more comprehensive protection of their company data…

Read More

What is CIS Control, Security Controls, and Cyber Defense

September 24, 2021

Learn the importance of CIS control and cyber defense and the role they play in the success of your network infrastructure. We share a lot about security. We do this to protect your company, network, data, and most importantly, your clients from cyber threats. We also do this because businesses today require a layered approach…

Read More

MFA for small businesses

July 29, 2021

During the past year, we have seen a significant increase in the number of email phishing scams. Vancouver Island organizations are being targeted and business leaders are now coming to terms with the costly consequences of poor password management coupled with lax cybersecurity practices and policies.  Multi-factor authentication (MFA) simply put is a method by which a user verifies his…

Read More

Linkedin data leak

July 5, 2021

On June 22nd, a user of a popular hacker forum, advertised for sale data from 700 million LinkedIn users. The user posted a sample of the data that includes 1 million LinkedIn users. The sample was found to contain the following information: Email addresses Full names Phone numbers Physical addresses Geolocation records LinkedIn username and…

Read More

What is a security champion?

June 17, 2021

What is a security champion? The concept of a security champion (SC) first emerged out of the developer community. At that time, security champions were seen as the professionals that could bridge the gap between application development and security. In recent years, we have seen this role emerge in small-to-medium-sized businesses. A security champion identifies…

Read More