Complexity Made Simple: A Case Study of a Phishing Attack

Today a small business owner became the victim of a phishing attack and almost lost access to their email account including: Bank emails Personal communications Professional communications Because email is a critical step in changing a user's password, if the owner...

Can Remote Work Reduce Your Business’ Operating Costs?

Can Remote Work Reduce Your Business’ Operating Costs?

Remote work is a new reality for many businesses. Perhaps you feel it was forced upon you and is a challenge to manage and monitor. Like any change, remote work models are unsettling. But as a change, it can also be a disruption in a good way. Having workers show up...

Work from Home May Be Here to Stay

Out of 3.4 million Canadians were told to work from home early in the Corona virus lockdown. 3/4 of those were still working from home in August according to Statistics Canada's latest Labour Force Survey. Having hired back workers over the 5 months since April,...

Ransomware Red Flags: 7 Signs You’re About to Get Hit

It's every security pro's nightmare: Your company has been hit with ransomware, and every machine and server has been encrypted. Shocked? Likely, but security experts say the warning signs were there all along. Misdirected DNS requests, bad VPN reboots, and Active...

Google? No Thanks; We Use Microsoft (Part-2)

(If you haven't read part 1, you can do so here.) In this article, we'll talk about Google Drive File Stream. Perhaps you've used the free Google Drive. Unless the document you create or open a Google doc of some sort (doc, sheet, slide, etc.) you have to download it,...

Google? No Thanks; We Use Microsoft (Part-1)

Someone recently said this to me and it got me thinking. Some people are loyal to a particular brand. Some families and even entire communities won't buy any truck if it isn't a GMC and no one can convince them otherwise. I get that some people don't like using...

QNAP NAS appliances at risk of malware

Does your business use a QNAP Network Attached Storage (NAS) device? If so, the Cybersecurity & Infrastructure Security Agency (CISA) urges you to update the firmware to the latest release level. Hackers released a malware known as QSnatch in 2019 targeting QNAP...

3 Things to Watch for in Preventing Business Email Compromises (BEC)

Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.

What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.