The year 2022 is bringing yet another wave of challenges as we continue our parade of working from the office, working from home, or working while travelling. Now, many of us have been doing this for quite a while, thanks to our laptops, docks, home Wi-Fi etc. We are...
Cybersecurity
Email Security
Email is not secure. It has never been secure, and little has changed since its invention by Ray Tomlinson back in 1971. Fast forward to 2022 and most business leaders and end users are aware of the risks of email phishing. Most also know that it is a primary way...
How to spot an email phishing scam
It takes just a couple of clicks to compromise your entire IT network. That’s it. Breaching your security can be so easy. Our advice to you is to shore up some easy to tackle security best practices. You do not have to be a victim. Email phishing is a tactic employed...
Ransomware targeting construction firms
While most medium-size construction operations are deeply reliant on technology, investment remains low compared to other industries. Over the years, we gained insight into some of the common problems with regards to IT that plague the sector, and we have some...
Conditional Access
In today’s modern workplaces, employees are accessing more and more company resources from remote locations creating a greater need for enhanced security. In response to these workplace shifts, Microsoft added Conditional Access to business premium licensing in 2019....
What is CIS Control, Security Controls, and Cyber Defense
Learn the importance of CIS control and cyber defense and the role they play in the success of your network infrastructure. We share a lot about security. We do this to protect your company, network, data, and most importantly, your clients from cyber threats. We also...
MFA for small businesses
During the past year, we have seen a significant increase in the number of email phishing scams. Vancouver Island organizations are being targeted and business leaders are now coming to terms with the costly consequences of poor password management coupled with lax...
Linkedin data leak
On June 22nd, a user of a popular hacker forum, advertised for sale data from 700 million LinkedIn users. The user posted a sample of the data that includes 1 million LinkedIn users. The sample was found to contain the following information: Email addresses Full names...
What is a security champion?
What is a security champion? The concept of a security champion (SC) first emerged out of the developer community. At that time, security champions were seen as the professionals that could bridge the gap between application development and security. In recent years,...
Why you need a password manager
By now, you have likely received a notification from a website you frequent about a data breach. The warning that was sent to you states that your credentials have been compromised. Or, you have heard about a big breach at for example, LinkedIn, Adobe, Ashley Madison...