employee copying files

What you don’t know your employees are doing behind your back can destroy your business. Enter predictive insider risk management tools. We all want to trust our staff.  After all, we went through a long and expensive process to hire them, get them up to speed, and set them on the path to achieving our…

Read Full Post
Zero Trust Networks

In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…

Read Full Post
employee using byod mobile phone

Most employees no longer believe an office presence is necessary for a productive day’s work. Some reports support the idea that greater focus and productivity can come from employees working from home. Other reports support the idea that teams function best when physically present together. Most certainly, since broadband access became widespread, and as mobile…

Read Full Post
data leaks in small business

There have been significant changes to Canada’s Digital Privacy Act, which are being enforced as of Nov 1, 2018, yet many small business owners are not informed on their responsibility in managing customer information. PIPEDA broadly defines “personal information” as “information about an identifiable individual.” It can be a clients age, financial information or a…

Read Full Post
usb data theft by employee

Usually when people discuss network security and potential threats, they are talking about external threats. A hooded figure behind a keyboard may not be the most likely culprit out there. Perpetrators can be on your own payroll. While news of large companies being breached pop up regularly, the importance of internal data security for small…

Read Full Post
cover art for guide for small business on limits of antivirus software

It’s easy to assume it won’t happen to you, until it does. Cyber criminals are targeting small businesses in a big way – and the consequences can be shocking. To protect your sensitive data and prevent security issues, our team at TUCU present this free guide to malware and viruses so that you can understand…

Read Full Post
password login screen

Password Security A single password can unlock access to your network and your company data. Every password should be created and managed with that in mind. This article offers up to date password research and password policy guidelines for small business owners to action to improve data security. Password hacking is one way that cyber…

Read Full Post
sample phishing email

The internet is a bit like the wild west, except instead of train and bank robbers we now have hackers who attempt to steal your information. The most popular way for these attackers to get control of your systems and companies’ information is through a method called “phishing”. These emails are designed to trick the…

Read Full Post
ransomware concept image

Canadian Ransomware Statistics Update Cyber crime is still going strong, and small business owners are suffering. Ransomware, created in 2013, is a new favourite among cyber criminals. This malicious software is designed to block access to a computer system, denying access to data until a sum of money is paid. For small business owners, it…

Read Full Post