2 factor authentication on accounts

It’s time for your company to enable Two Factor Authentication on your Microsoft accounts, before Microsoft locks you out – but your employees may be pushing back. Here is an explanation and instructions to get everyone prepared for the October cut-off date, even if you wait until the last day to actually pull the trigger.…

Read Full Post
data security concept

Every small business – from the local food truck, to the dental office, to the hedge fund to the design studio – trades in sensitive information. We all use technology and we all have to protect our own information, and that of our clients.  We all need security awareness, culture and systems to limit risk, especially…

Read Full Post
free web hosting email ransomware infection

Your free web hosting email could cost you $25,000.  Your server backup on a USB hard drive could cost you $50,000.  Cheap IT solutions are sometimes used by small business owners, and more often, they are resulting in ransomware infections, right here in Toronto. The ransoms were $4,000-5,000 a few years ago. This year we…

Read Full Post
small business with ransomware infection

Your server backup on that USB hard drive could cost you $50,000. Your free web hosted email could cost you $25,000. For years, small business owners have been using seemingly sufficient, free or cheap IT solutions but the real cost is changing. In 2019, cyber crime exploded in Canada. Previously, targets were largely aimed at…

Read Full Post
team on work from home video call

When it comes to IT security, especially work from home security, practice prevention. It’s cost effective, less stressful, less disruptive to business, and the only reporting involved is the good kind. Some people will avoid IT Security at all costs. One morning we received a call from a small firm with ransomware. They had been…

Read Full Post
employee password on screen

Two of the weakest points in your cyber security position are your employees behaviour (clicking risky links, opening bad attachments) and their passwords, because they are weak and easy to crack. This is true for large enterprise companies and small business alike. The good news is, secure password enforcement is fairly easy to lock down.…

Read Full Post
phishing concept using fishing lures

Remember that prince from Nigeria that was emailing everyone a few years back, with millions to share, he just needed your banking information.  Phishing emails today are sophisticated, evasive, capable of rewriting their tracks, and can sweep the globe before antivirus algorithms begin to detect them. You already know antivirus alone is not enough, because…

Read Full Post
letter blocks spelling out SPAM

45% of all emails are spam emails – that’s almost half of all emails sent out. Business email addresses are the target of more spam, because for a cyber criminal, access to a corporate or small business server can deliver more bang for their buck. The more accounts a spammer can phish or hack into,…

Read Full Post
employee copying files

What you don’t know your employees are doing behind your back can destroy your business. Enter predictive insider risk management tools. We all want to trust our staff.  After all, we went through a long and expensive process to hire them, get them up to speed, and set them on the path to achieving our…

Read Full Post
Zero Trust Networks

In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…

Read Full Post