Tech News

    Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gatherin...

Poison Attacks: A quick overview Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa...

Employee training & Cybersecurity Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need...

Is the Cloud really risk-free? The Cloud presents plenty of benefits that make it a very attractive choice, especially for SMBs who don’t want to be burdened ...

Get smart about smartphones With flexible working schedules, remote teams and Bring Your Own Device (BYOD) policies in force, it is has become commonplace for e...

Why you need the cloud? When talking to our clients, we have noticed that SMBs often think the cloud is something for their bigger counterparts to explore. We h...

Don’t sign up with that MSP just yet! The decision to sign up with a MSP is a big one–you are essentially trusting someone with the backbone of your bus...

Ransomware emails: How to identify and steer clear of them Ransomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs,...

How good is your password? Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices relat...

Think you are too small to be targeted by a cybercriminal? Think again. When I meet with clients, especially SMBs, I often hear them say that they feel their bu...

Keeping your data safe: Access Control Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your...

Ransomware part I The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten th...

Ransomware Part II In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do ...

Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data....

Are you subject to Data Protection laws? This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, o...

Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the bigg...

Yes, today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for...

The cloud refers to using off site computing resources and storage to supplement or even replace the use of on-site/in-house resources. Instead of buying hardwa...

Recently, we talked about ways the cloud brings value, business protection, and economies of scale to the smaller firm that they could never achieve by themselv...

Many small firms are pretty busy handling their own business, and don’t give much thought to what they would do if a natural disaster from a bad snowstorm to ...

If you’ve been following the news, the Internet of Things is getting increasing attention. You’re probably also thinking this is some Silicon Valley fan...

So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to...

   Any business that stores customer payment information must comply with a number of state and federal regulations. The legal, healthcare, and financial sect...

Not-for-profits have an unusual issue regarding security. Firms that have trained, paid full-time employees have a strong level of control over the actions of t...

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cybercrime is a growing industry known for its innovation. It goes far beyo...

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are careless ...

How the cloud saves smaller firms money OK. You pay someone to store all of your data in the cloud, as opposed to keeping it on your own server and backing it u...

SAFETY PUP SAYS…. Update One thing smaller firms and individuals are often reluctant to do is download updates to their operating systems and individual apps ...

    Smaller firms often struggle just to keep up with maintaining a website. Worrying about a scaled­ down version for mobile users seems like just too much ...

  You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy...

  Defense in Depth Part IIIn our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity...

     In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an ...

    Phishing Scams – A People ProblemThere are some things that only people can fix. There are many security risks to which your data is susceptible, but th...

    Benefits of Using VoIP Technology   More and more businesses are implementing Voice over Internet Protocol or VoIP technology because of its versatility,...

    Run your Business, not an IT Company   You went into business because you have an interest and expertise in some particular product or service. You began...

  The Cloud: Are there security issues?   For many, the idea of offloading their data to another physical/virtual location can seem like a security risk. It s...

    Loss of Data: Causes and Prevention   The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily depend...

    Data Protection Laws and PIIs   Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of speci...

    Are you subject to Data Protection laws?   This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define...

    Ransomware Part II   In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what yo...

    Ransomware part I   The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could th...