What is an SSL Certificate? SSL certificates verify that the website you are visiting: Is proven to belong to who they say they are (for example, an SSL certificate signed for www.rbcroyalbank.com won't work for www.rbcroyalbank.cn) cannot be read or deciphered by...
Business
Can Remote Work Reduce Your Business’ Operating Costs?
Remote work is a new reality for many businesses. Perhaps you feel it was forced upon you and is a challenge to manage and monitor. Like any change, remote work models are unsettling. But as a change, it can also be a disruption in a good way. Having workers show up...
Work from Home May Be Here to Stay
Out of 3.4 million Canadians were told to work from home early in the Corona virus lockdown. 3/4 of those were still working from home in August according to Statistics Canada's latest Labour Force Survey. Having hired back workers over the 5 months since April,...
Malware Email is on the Increase: Protect Your Business with Email Quarantines
Google is a security conscious company. I almost never get unfiltered spam or phishing attacks in my regular inbox.* By default, Google sends suspicious mail to the Junk E-mail folder (if it looks like spam but doesn't seem to contain anything harmful), or Google...
Google? No Thanks; We Use Microsoft (Part-1)
Someone recently said this to me and it got me thinking. Some people are loyal to a particular brand. Some families and even entire communities won't buy any truck if it isn't a GMC and no one can convince them otherwise. I get that some people don't like using...
QNAP NAS appliances at risk of malware
Does your business use a QNAP Network Attached Storage (NAS) device? If so, the Cybersecurity & Infrastructure Security Agency (CISA) urges you to update the firmware to the latest release level. Hackers released a malware known as QSnatch in 2019 targeting QNAP...
3 Things to Watch for in Preventing Business Email Compromises (BEC)
Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.
What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.
DNSÂ Firewalls: A New Tool to Protect your Business
If your computer connected to a DNS Firewall instead of a regular DNS and you typed in “yotube.com” (note the missing “u” from “you”), the attack will be thwarted. Yotube.com is a known phishing site that tries to download malware (viruses, worms, ransomware, botnets, etc.) to anyone who mistakenly tries to visit it.
Should Your Company Consider Outsourcing its IT Management?
What are some of the challenges to consider? There are good reasons and bad reasons to outsource your IT. ​Two of the bad reasons are: You want to reduce costs (unless your current environment has been completely mismanaged). The days of seeing IT as a cost center are...
Twitter Hacked: What is Social Engineering?
Yesterday, Twitter announced that it had been hacked. Hackers seemed to target a number of accounts belonging to cryptocurrency companies and executives as well as VIP accounts of Joe Biden, Barack Obama, Kanye West, Bill Gates, and Elon Musk and others. The target...
Local Business Loses Out with Inadequate Phone System
I needed a BBQ part on Saturday and wanted to buy local. Google gave me a good list of local companies. No local business had a website integrated with their parts systems. It would take a phone call.I called the one that seemed to supply parts for my brand and model...
Copying Files from Home and Office
So you're spending your time between home and office these days (or if you're lucky the lake and the office). How do you get any work done when all your files are on the office server? In an ideal world, your business would support you by: Using a distributed...