On December 13, 2020, the US Government announced a major cyberattack on the US Treasury and Commerce departments. When you are a US government department, smaller hackers don't stand a chance against the routine security procedures of these organizations. These were...
Products and Services
Using a Tabletop Exercise to Plan in These Uncertain Times
With Canada solidly in a "second wave" situation and Alberta's infection rates soaring, businesses have good reason to be concerned. Do you know how your business will survive if a key person on your team needs to quarantine for 2 weeks or worse? Does your business...
What Can You Do With an Old Computer?
There comes a time when every computer has lived out its usefulness. What to do with old hardware? Manage Your Risks First of all, consider the risks. Running any Windows version earlier than Windows 10 is a huge risk. Older versions of Windows including: 7, Vista,...
Google Meet moving to compete with Zoom
Early in the pandemic, all the virtual meeting platforms: Google Meet, GoToMeeting, Microsoft Teams, Cisco Webex, and Zoom, found themselves in a gold rush. Zoom was the early leader--in part because of price: a freemium version allowed group meetings of up to 40...
New Facebook Phishing Attack Could Fool Many
I just received a Facebook Messenger message from a good friend yesterday. He apparently saw me in a video and thought I'd be interested in watching it. He's a friend who does send me interesting stuff once in a while and there was no reason not to click through....
Can You Trust Your Lawyer?
Law firms and lawyers are a profession we sometimes need to rely upon. We depend upon them to manage family matters, custody issues, contract disputes, and criminal matters. Many times, these issues are personally, professionally, or economically sensitive. For this...
“G-Suite” is Changing to “Google Workspace”: What Does This Mean?
Google is rebranding "G-Suite" to "Google Workspace." It's about time. When Atlas became a G-Suite Reseller, we decided to call our offering a "Digital Workspace Solution." It was G-Suite bundled with an optional backup solution. We're glad Google listened to...
Have You Been Owned/Pwned?
The term "Pwned" comes from video game culture and means "owned" (since the "o" and "p" characters are beside each other on a keyboard). Pwned implies domination, humiliation and ownership by an opponent. It is a taunt that you have been soundly defeated. "Pwned" has...
A Ransomware Attack that Turned into a Horror Story
October is Cybersecurity Month and the Canadian CyberSecurity Conference, MapleSEC, is running October 5 - 7. On Monday, Terry Cutler of Cyology Labs in Montreal shared a case study of a major Canadian company hit by ransomware. “IT guys are always asking for money,”...
Complexity Made Simple: A Case Study of a Phishing Attack
Today a small business owner became the victim of a phishing attack and almost lost access to their email account including: Bank emails Personal communications Professional communications Because email is a critical step in changing a user's password, if the owner...
As of September 1, Multi-year SSL Certificates Will No Longer Be Trusted
What is an SSL Certificate? SSL certificates verify that the website you are visiting: Is proven to belong to who they say they are (for example, an SSL certificate signed for www.rbcroyalbank.com won't work for www.rbcroyalbank.cn) cannot be read or deciphered by...
Ransomware Red Flags: 7 Signs You’re About to Get Hit
It's every security pro's nightmare: Your company has been hit with ransomware, and every machine and server has been encrypted. Shocked? Likely, but security experts say the warning signs were there all along. Misdirected DNS requests, bad VPN reboots, and Active...