With Canada solidly in a "second wave" situation and Alberta's infection rates soaring, businesses have good reason to be concerned. Do you know how your business will survive if a key person on your team needs to quarantine for 2 weeks or worse? Does your business...
Security Products and Services
What Can You Do With an Old Computer?
There comes a time when every computer has lived out its usefulness. What to do with old hardware? Manage Your Risks First of all, consider the risks. Running any Windows version earlier than Windows 10 is a huge risk. Older versions of Windows including: 7, Vista,...
New Facebook Phishing Attack Could Fool Many
I just received a Facebook Messenger message from a good friend yesterday. He apparently saw me in a video and thought I'd be interested in watching it. He's a friend who does send me interesting stuff once in a while and there was no reason not to click through....
Can You Trust Your Lawyer?
Law firms and lawyers are a profession we sometimes need to rely upon. We depend upon them to manage family matters, custody issues, contract disputes, and criminal matters. Many times, these issues are personally, professionally, or economically sensitive. For this...
“G-Suite” is Changing to “Google Workspace”: What Does This Mean?
Google is rebranding "G-Suite" to "Google Workspace." It's about time. When Atlas became a G-Suite Reseller, we decided to call our offering a "Digital Workspace Solution." It was G-Suite bundled with an optional backup solution. We're glad Google listened to...
Have You Been Owned/Pwned?
The term "Pwned" comes from video game culture and means "owned" (since the "o" and "p" characters are beside each other on a keyboard). Pwned implies domination, humiliation and ownership by an opponent. It is a taunt that you have been soundly defeated. "Pwned" has...
A Ransomware Attack that Turned into a Horror Story
October is Cybersecurity Month and the Canadian CyberSecurity Conference, MapleSEC, is running October 5 - 7. On Monday, Terry Cutler of Cyology Labs in Montreal shared a case study of a major Canadian company hit by ransomware. “IT guys are always asking for money,”...
Complexity Made Simple: A Case Study of a Phishing Attack
Today a small business owner became the victim of a phishing attack and almost lost access to their email account including: Bank emails Personal communications Professional communications Because email is a critical step in changing a user's password, if the owner...
As of September 1, Multi-year SSL Certificates Will No Longer Be Trusted
What is an SSL Certificate? SSL certificates verify that the website you are visiting: Is proven to belong to who they say they are (for example, an SSL certificate signed for www.rbcroyalbank.com won't work for www.rbcroyalbank.cn) cannot be read or deciphered by...
Ransomware Red Flags: 7 Signs You’re About to Get Hit
It's every security pro's nightmare: Your company has been hit with ransomware, and every machine and server has been encrypted. Shocked? Likely, but security experts say the warning signs were there all along. Misdirected DNS requests, bad VPN reboots, and Active...
Malware Email is on the Increase: Protect Your Business with Email Quarantines
Google is a security conscious company. I almost never get unfiltered spam or phishing attacks in my regular inbox.* By default, Google sends suspicious mail to the Junk E-mail folder (if it looks like spam but doesn't seem to contain anything harmful), or Google...
Google? No Thanks; We Use Microsoft (Part-2)
(If you haven't read part 1, you can do so here.) In this article, we'll talk about Google Drive File Stream. Perhaps you've used the free Google Drive. Unless the document you create or open a Google doc of some sort (doc, sheet, slide, etc.) you have to download it,...