22 May 2020

‘If something works, why change it?’

 

If this is your approach to some business matters, you may be missing out on huge benefits. With innovation being the norm these days there’s an endless list of resources to consider for your company. They can help you enjoy higher productivity, an improved reputation and even help cut costs. 

 

View more
16 May 2020

What is Phish Training?

  • By David Reid
  • POSTED IN Technology
  • With 0 COMMENTS
  • BLOG POST TYPE

While technology has brought society many benefits over the years, it’s also a reality that these innovations carry risks. This is true when it comes to emails too, with a growing concern that a single email could give a hacker access to companies’ or individuals’ private information. This can easily happen through phishing emails created by cyber criminals.

 

So, how do you stop this from happening to your company?

 

View more
12 May 2020

Is My Business Protected From Ransomware?

  • By Loïc Calvez
  • POSTED IN Technology
  • With 0 COMMENTS
  • BLOG POST TYPE

The conversation usually goes something like this: Hey, company X that (we do business with / my friend works at / we share some clients with…) just got ransomwared and were down for Y days/weeks, is my business protected from ransomware? 

View more
9 May 2020

Why Should I Get a Next Generation Anti-Malware?

  • By David Reid
  • POSTED IN Technology
  • With 0 COMMENTS
  • BLOG POST TYPE

Certain terms have become commonplace for anyone using the World Wide Web and a business network. ‘Anti-malware’ & ‘Firewall’ are some of these terms and these security features can be found on most end-users’ devices.

 

But now there’s a new term you need to take notice of: Next generation anti-malware. What is it and why do you need it?

View more
30 April 2020

What is Multi Factor Authentication?

  • By David Reid
  • POSTED IN Technology
  • With 0 COMMENTS
  • BLOG POST TYPE

A multi factor authentication (MFA) is a security system that requires multiple credentials so you can log into a digital account. Since we live in a digital era almost every task we do is performed through the internet. Internet banking, online shopping and eLearning webpages require passwords & identifiable information in order for you to use the site.

 

View more
3 April 2020

Work From Home Phase 2: Optimize

  • By Loïc Calvez
  • POSTED IN Technology
  • With 0 COMMENTS
  • BLOG POST TYPE

As many of our customers, I am sure many of you are now working from home (if you can) and getting used to the new [temporary] normal. We wanted to provide a couple of tips and tricks to provide a better (and more secure) experience.

View more
16 March 2020

I wish I did not have to write this one, but it looks like I must. In these times of chaos, where we all should be focusing on the safety of our families, friends and communities, it appears that some groups are still dedicating themselves at going after our data. Recent malware has appeared in forms of COVID-19 maps and plain old regular malware hidden in documents of all shapes and sizes is still raging.

View more
24 November 2019

Creating a Cybersecurity Framework 3 of 5

Continuing our goal of providing a high-level overview of the things you should be doing to be more Cybersecure, this is part 3 of 5. You now have started to take some decisions on how to protect your key assets, but in some ways, you are still blind. This is where the third function of NIST, “Detect” comes into play. You can find part 1 “Identify” here, and part 2 “Protect” here.

View more
21 October 2019

Creating a Cybersecurity Framework 2 of 5

Continuing our goal of providing a high-level overview of the things you should be doing to be more Cybersecure, this is part 2 of 5. Now that you have identified your assets and their “value”, we will focus on “Protect”, for a recap of the Five Functions of NIST you can read here and you will find part 1, Identify, here.

What we aim to protect:

View more