Cybersecurity

Use a password manager

Are you getting fed up with all of the passwords you have to manage? Are you perpetually reusing the same password? Well, you are not alone! Our Virtual Chief Information Officers (vCIOs) have been getting a lot of questions lately from our clients about password...

Another Massive Breach…

Big data breaches are happening much more frequently than ever before. The latest is the People Data Labs (PDLs) breach that occurred on October, 16 2019. Detected by security researchers, Vinny Troia and Bob Diachenko, the breached exposed 1.2 billion people and...

Shadow IT

Shadow IT is likely a new term for most of us. It refers to technology, usually software or devices, introduced and used outside the awareness or control of IT management.

IE is not a Browser

Internet Explorer (IE) has been a long-standing staple of the work computer. It is used to do everything from accessing internal tools, to casual web browsing during coffee breaks. And, while it was once good and handy, time has not been kind to the little ‘e’ — it has become a very big risk.

Why your Business Needs MFA?

Multi-factor authentication (MFA) is an additional layer of security that offers greater protection against hackers. MFA requires two different factors to verify a user. Login credentials are most commonly used in addition to accessing a passcode from another trusted...

Beware of Mindspark

Beware of browser add-ons that offer all sorts of incentives including Mindspark Beware of Mindspark; just do not click on the product. Ever.  We are receiving many inquiries about infections from Mindspark/MyWebSearch/Ask toolbars. It shouldn't be an issue,...

Email phishing hints

Digital communication is becoming a bigger and bigger part of the working day. Most instructions, including everyday communication and in some cases, actual transactions are done with a one-line email message. Take a quick look at the two emails below. Both could be...

Cloud security roadmap

These days, most companies are utilizing cloud technologies. In 2018, Microsoft announced that there were over 155 million business users on Office 365, and this continues to grow rapidly. While the cloud offers great benefits, many businesses give little thought to...

Stolen or lost laptops

The loss or theft of a work laptop is a major headache for any professional. You will incur hardware replacement costs and it may even impact your productivity. However, the more damaging costs are those associated with the loss of sensitive data on that computer,...