By now, you have likely received a notification from a website you frequent about a data breach. The warning that was sent to you states that your credentials have been compromised. Or, you have heard about a big breach at for example, LinkedIn, Adobe, Ashley Madison...
Cybersecurity
Cybersecurity accountability
As a business leader, you must abide by laws and regulations, contractual obligations and demonstrate due diligence when it comes to cybersecurity management.Laws and regulations Some of your accountability stems from laws and regulations, particularly around privacy,...
Modern backup management: every incremental backup counts
Technology continues to play an even greater role in core business activities and therefore protecting those assets is now more important than ever. The best way to deal with the growing reliance on technology and data is with modern backup management. Backups have...
How to prevent a data breach
It has never been easier to share and collaborate with co-workers on data than now. Saying that, let’s be sure we protect our sensitive company information against the threats that cloud-based computing accelerates. Historically, you may have had an internal policy...
Are you taking cloud security seriously?
You can lockdown your Microsoft 365 environment and protect your business from common cloud-focussed attacks by adopting these four cloud security best practices. #1 | Enable a Single Sign On (SSO) Solution Single Sign On (SSO) is an authentication process that allows...
Enable Single Sign On (SSO)
Are you or your employees suffering from password and username fatigue? The burden is real.Do not let the required higher level of security fatigue your staff Usernames and passwords are the primary target for cybercriminals. Every login point or instance can become...
10-billion email addresses
Have you ever been to the website www.haveibeenpwned.com? Well, it is one resource that we recommend you visit as soon as possible. At the website Have I been PWND you can search your email accounts to see if you have been involved in any known security breaches. The...
Work from home security check up
Just six months ago, the potential impacts of COVID-19 were just becoming clear to everyone. Retail sales in Canada had dropped by 10% (which is substantial) and dipped to a five-year low by April. The Canada-U.S. border closed for the first time since confederation...
Managing identity in the cloud
Right now, how many cloud applications are being used in your small business? You may be surprised by the quantity and the potential lack of security that is exposing you and your business to risks. Fortunately, I have an effective solution and a set of...
Data protection while working from home
Many of you are now working from home, have a good set up with computers, screens, and chairs and are getting used to the remote situation. Now that you are all set, have you considered data privacy and protection? If you are working with company data and are working...