How do we prove who we are when we sign into a website or check our email? We generally start with a username and a password. These are sometimes referred to as "Something you know." Depending on the site's requirements, our username is often our email address so...
Risks
Do You Use the Same Password for Multiple Logins? Time to STOP!
It seems easy to just remember one password and use it over and over again. It's quick to type (once you get used to it), and fast to enter. But it's a BAD idea. Why? Because if anyone get's hold of your password (by hacking a site where you have an account), they are...
Google or Microsoft or Free? Which Email Provider is Best for your Business?
There are basically 3 choices for today's business users when it comes to email options: Free and low-cost offerings by companies including those that may already manage your website; Google; and Microsoft. Free Email Accounts These are generally emails ending in...
Do You Have a Cyber-Insurance Policy?
Your accuracy in answering your insurer’s questionnaire can make the difference between getting the coverage you paid for or being denied it when you need it most.* Atlas Solutions is partnering with a cyber-insurance underwriter to prequalify clients for insurance....
Do Your Employees use Cellphones or Laptops for Work? What You Need to Know…
Have any of these scenarios happened to you? An employee loses their laptop or tablet, or has it stolen while working at a coffee shop or stepping out of their car at a convenience store. An employee or one of their children downloads a "neat game" on the internet...
Why You Need to Store Client Information Properly
A couple of years ago, I rented a U-Haul to move some furniture. This past week, I got an email that U-Haul's databases was hacked and my personal information including driver's license data was stolen. I'm currently following up with U-Haul about the scope and impact...
What Can You Do with Customers’ Information?
Tim Horton's is a national brand in Canada. Millions of people buy their coffee, donuts, and muffins from "Timmys" every day. But last week, Tim Hortons was in the news for abusing customer information. Using the corporate app downloaded by millions of people, Tim...
Atlas Announces its New Firewall Offerings
We looked long and hard at firewall options for our clients. Many were just too expensive to make sense for small and medium businesses. Many were more about hype than substance; if they had spent as much on their product as on their videos and marketing material,...
Do I Need a Firewall?
Here's a 4 minute video to explain what firewalls do and why they could make sense for you...
What is Pen Testing? Is it Worth It?
Your corporate insurance broker might have recommended penetration testing, or "Pen Testing", as a cybersecurity strategy for your business. What is "Pen Testing"? To answer that question, think of your computer systems as a large building. Buildings have doorways....
What is the Log4j Hack?
On December 9, cybercriminals began using a newly identified weakness in a commonly used system library called Log4J. You probably haven't heard of Log4J, nor should you. It is a library used to output log files so developers can solve problems. But the real problem...
Why it’s Important to Sign your Emails
A Tale of Two Messages I sent out two identical messages that arrived in the receiver's mailbox. The first (the one on the left) ended up in the recipient's Junk E-mail folder. When the recipient opened it using Gmail on an Android phone, they saw a very concerning...