Are you getting fed up with all of the passwords you have to manage? Are you perpetually reusing the same password? Well, you are not alone! Our Virtual Chief Information Officers (vCIOs) have been getting a lot of questions lately from our clients about password...
Cybersecurity
Another Massive Breach…
Big data breaches are happening much more frequently than ever before. The latest is the People Data Labs (PDLs) breach that occurred on October, 16 2019. Detected by security researchers, Vinny Troia and Bob Diachenko, the breached exposed 1.2 billion people and...
Shadow IT
Shadow IT is likely a new term for most of us. It refers to technology, usually software or devices, introduced and used outside the awareness or control of IT management.
IE is not a Browser
Internet Explorer (IE) has been a long-standing staple of the work computer. It is used to do everything from accessing internal tools, to casual web browsing during coffee breaks. And, while it was once good and handy, time has not been kind to the little ‘e’ — it has become a very big risk.
Why your Business Needs MFA?
Multi-factor authentication (MFA) is an additional layer of security that offers greater protection against hackers. MFA requires two different factors to verify a user. Login credentials are most commonly used in addition to accessing a passcode from another trusted...
Beware of Mindspark
Beware of browser add-ons that offer all sorts of incentives including Mindspark Beware of Mindspark; just do not click on the product. Ever. We are receiving many inquiries about infections from Mindspark/MyWebSearch/Ask toolbars. It shouldn't be an issue,...
How do you manage all of your passwords?
Are you using a password manager at your small business? How many passwords do you have to access in your day-to-day work? Is there as many as 20 or how about up to 50? According to LastPass, a small business employee has an average of 85 passwords that they will have...
Email phishing hints
Digital communication is becoming a bigger and bigger part of the working day. Most instructions, including everyday communication and in some cases, actual transactions are done with a one-line email message. Take a quick look at the two emails below. Both could be...
Cloud security roadmap
These days, most companies are utilizing cloud technologies. In 2018, Microsoft announced that there were over 155 million business users on Office 365, and this continues to grow rapidly. While the cloud offers great benefits, many businesses give little thought to...
Stolen or lost laptops
The loss or theft of a work laptop is a major headache for any professional. You will incur hardware replacement costs and it may even impact your productivity. However, the more damaging costs are those associated with the loss of sensitive data on that computer,...