Protecting Your Computers While Working from Home

Home Computer Security

Many families today have a shared home computer to help with all their normal day-to-day activities. A teen can do school work, play games and chat to friends, a parent can check work emails, pay household bills and shop online while the youngsters play some games and browse YouTube. Yet with COVID-19 sending so many people home to work, the shared computer is getting a lot more use and is now also being used for business or corporate work. Continue reading

Isolate Yourself from the Coronavirus Scams!

Carona Virus Scams

Scammers jump on any of the latest happenings in the world and are always looking for opportunities, and at the moment they are targeting the coronavirus (aka COVID-19). This article outlines what you need to watch out for and how to stay cyber safe. Continue reading

Are You Protected Against Leakware?

Leakware or extortionware

You should have heard about ransomware by now. Cyber-criminals access and encrypt your data and you have to pay a “ransom” for the key to unlock your data. If you have a backup you can revert to that and forget about the hackers threats. Leakware (also known as extortionware) is similar, but now the bad actors are threatening to post your confidential information online if you don’t pay up. Continue reading

Do Not Get Hooked By a Whaling Attack

Whaling Attack

The executives of your company are the big fish in your sea and cyber-criminals think of them as whales. In fact, whaling is a new cyber-security threat targeting your C-suite level staff. Continue reading

Security or Flexibility: Which Matters More?

Security versus Flexibility?

Business is all about making tough choices. One such choice is whether to value IT security or business flexibility more. Unfortunately, you can not have the best of both at the same time. Continue reading

What is a Firewall and Why Do They Matter?

Hearing “firewall” in the context of computing can be confusing.  This blog article aims to explain what a firewall is and how it will benefit your business. Continue reading

How the Bad Guys Get Your Passwords

Password thiefPasswords are an essential part to your businesses cybersafety. If, like the rest of us, you have dozens of passwords to remember, you might take shortcuts. Taking advantage of this type of attitude is one way bad guys access your passwords. Continue reading

Compliance Issues Your Business Might Be Missing

ComplianceInformation security is on all business’ radar these days. Data drives so much of what we do. Looking to contain the risks, many sectors have established IT compliance regulations. Whether you legally have to meet a standard or not, don’t overlook these common areas of concern. Continue reading

Are You Doing Your IT Due Diligence?

Due DiligenceDue diligence is about taking care and being cautious in doing business. As technology pervades most areas of business people forget that due diligence also extends to how you manage your technology! You may think you are immune to a data breach or cyberattack, but cybercriminals can target you regardless of your business size or industry sector. Continue reading