Security
MFA vs SSO for Small Business IT Security
MFA vs SSO for Small Business IT Security Recently, a new client asked about how she can make it easier for her team to log in to the many apps they all use, and more importantly, how to easily change the login credentials for all those apps when staff changeovers happen. As a growing start-up…
Read Full PostWhat is a Trusted Device?
What is a Trusted Device? Protecting company email accounts is critical to your IT security because gaining access to an email address is a cyber criminals dream. Bad actors can silently mine a compromised account for years. They will use or sell the information gathered. So how do you keep all your company devices secure…
Read Full PostA Secure Cloud EMR Is Only The Start
A Secure Cloud EMR Is Only The Start Your EMR is secure. Great! What about your computers & email accounts? As a practice owner using a cloud EMR or medical or dental practice management software, you might assume everything is secure. And that is true. It’s also false. Here’s what you need to know about IT…
Read Full PostMicrosoft InTune Permissions and Privacy
Microsoft InTune Permissions and Privacy You are thinking of switching to Microsoft InTune security tools & processes, and naturally, you have a few questions about the permissions InTune asks for on each device and your privacy. We address those concerns and demonstrate that neither InTune or your IT management services team are not using InTune…
Read Full Post11 Useful Policies For Canadian Businesses
11 Useful Policies For Canadian Businesses Technology management is complex. Clearly defined policies provide clarity. Below is a list of some of the more common useful policies for Canadian organizations to help you manage technology, security and expectations. You can set aside time to create or review these policies for your business on an annual…
Read Full PostThe Dark Web and Protecting Small Business
The Dark Web and Protecting Small Business What Is The Dark Web? The United States government created the dark web’s multi-layered tor (the onion router) technology in the mid-1990s to allow spies to anonymously exchange information. The dark web attracts a lot of bad actors. They buy and sell malware, computer exploit kits, passwords, credit…
Read Full PostHow To Use Apple Business Manager for IT Security Screenings
How To Use Apple Business Manager for IT Security Screenings Vendor screening is an important step that helps companies reduce their liability when working with subcontractors – helping companies mitigate contractual, fiscal, and compliance risks. According to PWC, 85% of consumers are not willing to do business with organizations if they have doubts about their…
Read Full PostHow to prevent data loss with a remote work team?
How to prevent data loss with a remote work team? Enabling Data Loss Prevention for Remote Work on a Budget For most companies in Canada, working remotely was not a choice, and the transition was rushed during a crisis. Consequently, companies, especially SMBs are unprepared for the various risks that come with remote work. Canadian…
Read Full PostGuide to PCI DSS Compliance In Canada
Guide to PCI DSS Compliance In Canada Content Intro What is PCI DSS? How to become PCIDSS compliant? Compliance Assessment Tools 3 ways to become compliant Cost of compliance Benefits of compliance Wrapping Up The Allianz Risk Barometer report for 2020 found that cyber incidents posed the biggest risk to businesses in 2020. The risk…
Read Full PostGuide to COBIT Compliance for Business in Canada
Guide to COBIT Compliance for Business in Canada In 2021, Canadian businesses must have an internal conversation about compliance. Small and Medium Businesses in Canada are increasingly susceptible to cyberattacks. According to the Canadian Centre for Cyber Security (CCCS), cybercrime is the biggest threat to Canadian businesses with more than 11 cyberattacks on average per…
Read Full Post