Skip to content

Network Security

Data Leaks, Digital Privacy Act & Your Small Business

data leaks in small business

There have been significant changes to Canada’s Digital Privacy Act, which are being enforced as of Nov 1, 2018, yet many small business owners are not informed on their responsibility in managing customer information. PIPEDA broadly defines “personal information” as “information about an identifiable individual.” It can be a clients age, financial information or a…

Read Full Post

Password Policy Guidelines For Small Business

password login screen

A password is a personal identifier and a key. A single password can unlock access to your network and your company data. Every password should be created and managed with that in mind. This article offers up to date password research and password policy guidelines for small business owners to action to improve data security.…

Read Full Post

Canadian Network Security Risk Statistics

text canadian network security risks with image of digital password being stolen

If you own a business, you almost certainly use technology every day. Aside from routine operations, technology is also utilized in various forms to communicate with clients and with other team members. If you are like most businesses, not all communication happens within the office. You probably use a combination of computers, tablets, and smartphones…

Read Full Post

3 Basic Layers Of Network Security For Small Business

3 layers of network security cover

Good network security practices are required to protect your company and client data, the lifeblood of your business. Whether you are in research and development, marketing, law or the nonprofit sector, getting these things right will ensure you have the proper defenses in place the next time a big attack like WannaCry happens.  Good networking…

Read Full Post

Protection Against Ransomware In 2016-2017

Sensitive Data & Protection Against Ransomware In Small Business In 2013 there were only 2 types of ransomware. By mid 2015 there were 9 variants.  In 2016, ransomware grows and evolves with new variants with more sophisticated encryption and file destruction methods circulating. Until now, cyber criminals have been randomly testing their ransomware exploit kits. 2016…

Read Full Post

About PowerWare; Ransomware in Word Documents

Does your team use Microsoft Word? Most teams do. Is your team highly skilled in spotting and avoiding Ransomware? Most teams are not. Here is what you need to know about PowerWare – a new ransomware in Word documents. PowerWare is a recently discovered threat that exploits Windows Operating Systems using PowerShell. PowerShell is essentially…

Read Full Post

Common Network Security Threats In 2015

shield your business from cyberthreats

In October 2015 alone, there were 1500 active malware families. 3 of them were responsible for 40% of all successful DDOS attacks on networks and spam campaigns.  We’ve listed them below, and have included a fourth Trojan virus because of its rapid rise in use to steal passwords, financial data and more.  Being aware of these threats…

Read Full Post

Ransomware Rising Sharply In 2015

Ransomware Rising – Keep These Costly Viruses Off Your Network In 2013, there were only two ransomware families: Cryptolocker and Cryptowall. In the first half of 2015, nine new ransomware families emerged: CoinVault TeslaCrypt Cryptofortress PClock AlphaCrypt El-Polocker CoinVault 2.0 Locker TOX Ransomware remains highly lucrative for hackers. These viruses continue to evolve and have been…

Read Full Post
Scroll To Top