Cybersecurity

Working from anywhere, safely

The year 2022 is bringing yet another wave of challenges as we continue our parade of working from the office, working from home, or working while travelling. Now, many of us have been doing this for quite a while, thanks to our laptops, docks, home Wi-Fi etc. We are...

Email Security

Email is not secure. It has never been secure, and little has changed since its invention by Ray Tomlinson back in 1971.   Fast forward to 2022 and most business leaders and end users are aware of the risks of email phishing. Most also know that it is a primary way...

How to spot an email phishing scam

It takes just a couple of clicks to compromise your entire IT network. That’s it. Breaching your security can be so easy. Our advice to you is to shore up some easy to tackle security best practices.  You do not have to be a victim. Email phishing is a tactic employed...

Ransomware targeting construction firms

While most medium-size construction operations are deeply reliant on technology, investment remains low compared to other industries. Over the years, we gained insight into some of the common problems with regards to IT that plague the sector, and we have some...

Conditional Access

In today’s modern workplaces, employees are accessing more and more company resources from remote locations creating a greater need for enhanced security. In response to these workplace shifts, Microsoft added Conditional Access to business premium licensing in 2019....

CIS Controls

We share a lot about security. We do this to protect your company, network, data, and most importantly, your clients from cyber threats. We also do this because businesses today require a layered approach to security. This includes everything from best practices like...

MFA for small businesses

During the past year, we have seen a significant increase in the number of email phishing scams. Vancouver Island organizations are being targeted and business leaders are now coming to terms with the costly consequences of poor password management coupled with lax...

Linkedin data leak

On June 22nd, a user of a popular hacker forum, advertised for sale data from 700 million LinkedIn users. The user posted a sample of the data that includes 1 million LinkedIn users. The sample was found to contain the following information: Email addresses Full names...

What is a security champion?

What is a security champion? The concept of a security champion (SC) first emerged out of the developer community. At that time, security champions were seen as the professionals that could bridge the gap between application development and security. In recent years,...

Why you need a password manager

By now, you have likely received a notification from a website you frequent about a data breach. The warning that was sent to you states that your credentials have been compromised. Or, you have heard about a big breach at for example, LinkedIn, Adobe, Ashley Madison...