You can call anyone you want on your telephone or mobile, even if they are another telephone company. You can mail a letter or a package to anyone you want--even a criminal. The telephone company must connect you; and the post office must deliver your letter. It has...
Security Products and Services
Smart Enhancements to Google Workspace are on the Way
Google is making massive changes to Workspace over the coming months. Google is a phenomenally innovative company when it comes to technology but seems to struggle when it comes to marketing slogans. This might explain which it chose to call this initiative "smart...
Latest in Phone Scams
As a pretty security savvy IT person, "Yours Truly" was almost stung this morning. I answered an incoming cell call from an Ontario phone number. Very quickly, a recorded message began with a North American digitized voice in perfect English telling me that I had 2...
Ransom Attack Hits DC Police Department
Yesterday, May 13, 2021, the Washington DC's Metropolitan Police Department (MPD) reported a massive internal data breach. It was the worst ever ransomware attack on a US police department. Thousands of documents were posted to the dark web on Thursday. Included in...
The Future of Work
With vaccination levels rising (at least across the wealthier nations of the world), life and work will return to normal. Or will it? 30% of American workers say that they'll quit their jobs if they're forced to go back to the office full-time. 71% of white collar...
When the Gaming Gets Real
Being a business services company, Atlas doesn't serve a lot of gamers. But sometimes a working parent wants to protect all the computers in their home, not just theirs. Sometimes those computers belong to gamers. And some gamers want to load software that gets around...
Is Your Cloud Data at Risk?
There is a widespread misconception that data created and stored in Google Workspace does not need to be backed up. While Google certainly has you covered when it comes to any outages on their part, recovering data due to accidental or malicious deletion is your...
What the Heck is Credential Stuffing?
How many passwords do you use? 1? 2? 5? Most people use a small number of passwords over and over again. There are people who only have a single password for every site they visit: email, banking, Canadian Revenue Agency, social media, dating sites--everything. It's...
Mac Users Don’t Need to Feel Left Out
Mac users have always had less problems with viruses and malware than had Windows users. Much of this is because Windows is more entrenched; if you're a hacker, are you going to write code for 7.6%% of the market that use Macs, or the 92% with Windows? Apple makes it...
What Makes a Good “Antivirus”?
Viruses and malware is a real and present danger for computers. While most malware is written for Microsoft Windows, Macintoshes are not immune from infections. Typically, computers come with some sort of anti-virus software: Windows Defender (for Windows) or XProtect...
How to Charge your Phone for $107 Million
It's as Easy as This... Sometime in late 2019, an employee with the Saskatchewan Health Authority (SHA) plugged a personal device into their work computer to charge it. The device had a file infected with the Ryuk ransomware package. While connected, they opened a...
Lessons from the US Treasury Cyberattack
On December 13, 2020, the US Government announced a major cyberattack on the US Treasury and Commerce departments. When you are a US government department, smaller hackers don't stand a chance against the routine security procedures of these organizations. These were...