phishing concept using fishing lures

Remember that prince from Nigeria that was emailing everyone a few years back, with millions to share, he just needed your banking information.  Phishing emails today are sophisticated, evasive, capable of rewriting their tracks, and can sweep the globe before antivirus algorithms begin to detect them. You already know antivirus alone is not enough, because…

Read Full Post
letter blocks spelling out SPAM

45% of all emails are spam emails – that’s almost half of all emails sent out. Business email addresses are the target of more spam, because for a cyber criminal, access to a corporate or small business server can deliver more bang for their buck. The more accounts a spammer can phish or hack into,…

Read Full Post
woman working from home office

If you are still struggling to get your staff ‘Work From Home (WFH)’ ready, we can help. Coronavirus has hit many businesses hard, and as businesses are scrambling to create secure work from home solutions, our team at TUCU is all hands on deck to make that happen for you. Secure work from home solutions…

Read Full Post
employee copying files

What you don’t know your employees are doing behind your back can destroy your business. Enter predictive insider risk management tools. We all want to trust our staff.  After all, we went through a long and expensive process to hire them, get them up to speed, and set them on the path to achieving our…

Read Full Post
security icons denoting pipeda compliance

What small business owners in Canada need to know about staying compliant with Microsoft Office 365. As Canadian small business owners gear up for another year of e-privacy and data protection regulation, it’s a good time to review Microsoft Office 365’s status in light of PIPEDA compliance. As you know, the Canadian Personal Information Protection…

Read Full Post
small business owner managing own IT on laptop

The end of the year is a great time to organize your books, reflect with your team, prepare for growth next year, and upgrade your technology. In this post, we give you specific DIY tips you can do to check and secure your computers and accounts to better protect your business. Managed IT Service Providers…

Read Full Post
Zero Trust Networks

In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…

Read Full Post
employee using byod mobile phone

Most employees no longer believe an office presence is necessary for a productive day’s work. Some reports support the idea that greater focus and productivity can come from employees working from home. Other reports support the idea that teams function best when physically present together. Most certainly, since broadband access became widespread, and as mobile…

Read Full Post
computers under water after flood depicting small business without disaster recovery plan

As a small business owner, you keep up with your industry – not tech terms. So the last thing you need is a bunch of confusing, meaningless jargon when you’re trying to understand what steps you need to take to ensure you can pull of a real disaster recovery for small business in the event…

Read Full Post