phishing concept using fishing lures

Remember that prince from Nigeria that was emailing everyone a few years back, with millions to share, he just needed your banking information.  Phishing emails today are sophisticated, evasive, capable of rewriting their tracks, and can sweep the globe before antivirus algorithms begin to detect them. You already know antivirus alone is not enough, because…

Read Full Post
letter blocks spelling out SPAM

45% of all emails are spam emails – that’s almost half of all emails sent out. Business email addresses are the target of more spam, because for a cyber criminal, access to a corporate or small business server can deliver more bang for their buck. The more accounts a spammer can phish or hack into,…

Read Full Post
employee copying files

What you don’t know your employees are doing behind your back can destroy your business. Enter predictive insider risk management tools. We all want to trust our staff.  After all, we went through a long and expensive process to hire them, get them up to speed, and set them on the path to achieving our…

Read Full Post
Zero Trust Networks

In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…

Read Full Post
employee using byod mobile phone

Most employees no longer believe an office presence is necessary for a productive day’s work. Some reports support the idea that greater focus and productivity can come from employees working from home. Other reports support the idea that teams function best when physically present together. Most certainly, since broadband access became widespread, and as mobile…

Read Full Post
data leaks in small business

There have been significant changes to Canada’s Digital Privacy Act, which are being enforced as of Nov 1, 2018, yet many small business owners are not informed on their responsibility in managing customer information. PIPEDA broadly defines “personal information” as “information about an identifiable individual.” It can be a clients age, financial information or a…

Read Full Post
usb data theft by employee

Usually when people discuss network security and potential threats, they are talking about external threats. A hooded figure behind a keyboard may not be the most likely culprit out there. Perpetrators can be on your own payroll. While news of large companies being breached pop up regularly, the importance of internal data security for small…

Read Full Post
cover art for guide for small business on limits of antivirus software

It’s easy to assume it won’t happen to you, until it does. Cyber criminals are targeting small businesses in a big way – and the consequences can be shocking. To protect your sensitive data and prevent security issues, our team at TUCU present this free guide to malware and viruses so that you can understand…

Read Full Post
password login screen

Password Security A single password can unlock access to your network and your company data. Every password should be created and managed with that in mind. This article offers up to date password research and password policy guidelines for small business owners to action to improve data security. Password hacking is one way that cyber…

Read Full Post