Oct 24, 2022 | Business Continuity
Phishing. You can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. For example, a cybercriminal may want to steal employee login credentials. Or wish to...
Jun 17, 2022 | Cybersecurity
Everyone hates spam emails. Having to clear spam from your inbox is a real productivity killer. A recent report found that your employees could lose up to 80 hours each year thanks to filtering and deleting spam emails. That’s a LOT of lost productivity. Between 45%...
Mar 17, 2020 | Business Continuity
Our recent blog talked about the data security concerns that BYOD can bring to your workplace. However, there is another factor that needs consideration before adopting BYOD. How much Bring Your Own can your IT department support? Supporting too many different...
Mar 4, 2020 | Business Continuity
You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. What is Multi-factor Authentication? As fancy as the term sounds, multi-factor authentication (MFA)...
Feb 19, 2020 | Business Continuity
The dark web is essentially a marketplace for cybercriminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold to miscreants who can later hack into your system. As a result, they can extort money from you to prevent a...