team on work from home video call

When it comes to IT security, especially work from home security, practice prevention. It’s cost effective, less stressful, less disruptive to business, and the only reporting involved is the good kind. Some people will avoid IT Security at all costs. One morning we received a call from a small firm with ransomware. They had been…

Read Full Post
employee password on screen

Two of the weakest points in your cyber security position are your employees behaviour (clicking risky links, opening bad attachments) and their passwords, because they are weak and easy to crack. This is true for large enterprise companies and small business alike. The good news is, secure password enforcement is fairly easy to lock down.…

Read Full Post
phishing concept using fishing lures

Remember that prince from Nigeria that was emailing everyone a few years back, with millions to share, he just needed your banking information.  Phishing emails today are sophisticated, evasive, capable of rewriting their tracks, and can sweep the globe before antivirus algorithms begin to detect them. You already know antivirus alone is not enough, because…

Read Full Post
letter blocks spelling out SPAM

45% of all emails are spam emails – that’s almost half of all emails sent out. Business email addresses are the target of more spam, because for a cyber criminal, access to a corporate or small business server can deliver more bang for their buck. The more accounts a spammer can phish or hack into,…

Read Full Post
Zero Trust Networks

In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…

Read Full Post
cover art for guide for small business on limits of antivirus software

It’s easy to assume it won’t happen to you, until it does. Cyber criminals are targeting small businesses in a big way – and the consequences can be shocking. To protect your sensitive data and prevent security issues, our team at TUCU present this free guide to malware and viruses so that you can understand…

Read Full Post
sample phishing email

The internet is a bit like the wild west, except instead of train and bank robbers we now have hackers who attempt to steal your information. The most popular way for these attackers to get control of your systems and companies’ information is through a method called “phishing”. These emails are designed to trick the…

Read Full Post

New Gmail Phishing Email Looks Identical To Gmail Login Page As you know, phishing schemes are increasingly sophisticated, with fakes that appear nearly indistinguishable from genuine websites or email. Today we share with you a new Gmail phishing email scheme that is highly effective because it is difficult to spot. While this attack vector is targeted…

Read Full Post
Ransomware In Canada title over Canadian flag

Canadian Companies More Likely To Pay Ransomware Demands The following findings were the Canadian portion of a study of 540 respondents in 4 countries, and it seems Canadians were more likely to pay ransomware demands.  The study was undertaken by Osterman Research, published by Malware Bytes and reported on by Profit Guide. In this small…

Read Full Post