2 factor authentication on accounts

It’s time for your company to enable Two Factor Authentication on your Microsoft accounts, before Microsoft locks you out – but your employees may be pushing back. Here is an explanation and instructions to get everyone prepared for the October cut-off date, even if you wait until the last day to actually pull the trigger.…

Read Full Post
woman working from home with Microsoft 365 and IT support from TUCU

Work from home transitions may not have gone as smoothly or securely as you would like, as they were likely done in a hurry earlier this year. However, now you can step back and secure your remote work infrastructure and reinvent how your team works – and where you re-allocate your commercial rent budget. Migrating…

Read Full Post
data security concept

Every small business – from the local food truck, to the dental office, to the hedge fund to the design studio – trades in sensitive information. We all use technology and we all have to protect our own information, and that of our clients.  We all need security awareness, culture and systems to limit risk, especially…

Read Full Post
free web hosting email ransomware infection

Your free web hosting email could cost you $25,000.  Your server backup on a USB hard drive could cost you $50,000.  Cheap IT solutions are sometimes used by small business owners, and more often, they are resulting in ransomware infections, right here in Toronto. The ransoms were $4,000-5,000 a few years ago. This year we…

Read Full Post
small business with ransomware infection

Your server backup on that USB hard drive could cost you $50,000. Your free web hosted email could cost you $25,000. For years, small business owners have been using seemingly sufficient, free or cheap IT solutions but the real cost is changing. In 2019, cyber crime exploded in Canada. Previously, targets were largely aimed at…

Read Full Post
team on work from home video call

When it comes to IT security, especially work from home security, practice prevention. It’s cost effective, less stressful, less disruptive to business, and the only reporting involved is the good kind. Some people will avoid IT Security at all costs. One morning we received a call from a small firm with ransomware. They had been…

Read Full Post
employee password on screen

Two of the weakest points in your cyber security position are your employees behaviour (clicking risky links, opening bad attachments) and their passwords, because they are weak and easy to crack. This is true for large enterprise companies and small business alike. The good news is, secure password enforcement is fairly easy to lock down.…

Read Full Post
phishing concept using fishing lures

Remember that prince from Nigeria that was emailing everyone a few years back, with millions to share, he just needed your banking information.  Phishing emails today are sophisticated, evasive, capable of rewriting their tracks, and can sweep the globe before antivirus algorithms begin to detect them. You already know antivirus alone is not enough, because…

Read Full Post
letter blocks spelling out SPAM

45% of all emails are spam emails – that’s almost half of all emails sent out. Business email addresses are the target of more spam, because for a cyber criminal, access to a corporate or small business server can deliver more bang for their buck. The more accounts a spammer can phish or hack into,…

Read Full Post
woman working from home office

If you are still struggling to get your staff ‘Work From Home (WFH)’ ready, we can help. Coronavirus has hit many businesses hard, and as businesses are scrambling to create secure work from home solutions, our team at TUCU is all hands on deck to make that happen for you. Secure work from home solutions…

Read Full Post