Network Security

5 Tips For Small Business Data Security Improvements

digital lock indicating weak Data Security policy

If sensitive data plays any role in your small business, you need to protect it. Sensitive data can be email correspondence with a client, payment information, financial records, personal identification used to approve or secure services or loans, health related information, legal case file information and more.  With more advanced and complex IT systems constantly evolving,…

Read Full Post

Canadian Network Security Risk Statistics

text canadian network security risks with image of digital password being stolen

If you own a business, you almost certainly use technology every day. Aside from routine operations, technology is also utilized in various forms to communicate with clients and with other team members. If you are like most businesses, not all communication happens within the office. You probably use a combination of computers, tablets, and smartphones…

Read Full Post

3 Basic Layers Of Network Security For Small Business

basic layers of network security for small business 2

Basic Network Security There are 3 basic principles of network security – 3 basic layers to protecting your information, the lifeblood of your business. Whether you are in research and development, marketing, law or the nonprofit sector, getting these three things right will ensure you have the proper defences in place the next time a…

Read Full Post

Canadian Companies and Ransomware

Ransomware In Canada title over Canadian flag

Canadian Companies More Likely To Pay Ransomware Demands The following findings were the Canadian portion of a study of 540 respondents in 4 countries, and it seems Canadians were more likely to pay ransomware demands.  The study was undertaken by Osterman Research, published by Malware Bytes and reported on by Profit Guide. In this small…

Read Full Post

Protection Against Ransomware In 2016-2017

Sensitive Data & Protection Against Ransomware In Small Business In 2013 there were only 2 types of ransomware. By mid 2015 there were 9 variants.  In 2016, ransomware grows and evolves with new variants with more sophisticated encryption and file destruction methods circulating. Until now, cyber criminals have been randomly testing their ransomware exploit kits. 2016…

Read Full Post

About PowerWare; Ransomware in Word Documents

Does your team use Microsoft Word? Most teams do. Is your team highly skilled in spotting and avoiding Ransomware? Most teams are not. Here is what you need to know about PowerWare – a new ransomware in Word documents. PowerWare is a recently discovered threat that exploits Windows Operating Systems using PowerShell. PowerShell is essentially…

Read Full Post

Common Network Security Threats In 2015

shield your business from cyberthreats

In October 2015 alone, there were 1500 active malware families. 3 of them were responsible for 40% of all successful DDOS attacks on networks and spam campaigns.  We’ve listed them below, and have included a fourth Trojan virus because of its rapid rise in use to steal passwords, financial data and more.  Being aware of these threats…

Read Full Post

Modern Network Security White Paper

whitepaper icon on grey background

IT Security; Creating Heroes, Not Headaches BitDefender is a proven IT security product that increases network security without unnecessary complexity.  We recommend BitDefender to our customers frequently. Today, we’re sharing a white paper prepared by BitDefender titled IT Security: Creating Heroes Instead of Headaches (click to download the PDF). Covered by this white paper are…

Read Full Post