Why You Need Both Software and Hardware Firewalls
A firewall sounds like a pretty intense thing – unless you’re an action-movie stuntman. Yet when it comes to internet security, you may not have as much firewall protection as you need. [Read more…]
by Tony Whitney
A firewall sounds like a pretty intense thing – unless you’re an action-movie stuntman. Yet when it comes to internet security, you may not have as much firewall protection as you need. [Read more…]
by Tony Whitney
When you sign up for an internet service, the provider will often hook you up with an email address, too. Your internet service provider (ISP) wants to keep you connected to them. But this convenient email address isn’t always the best long-term solution for you.
That “yourname@ispprovider.com” email address (@shaw.ca, telus.net, telusplanet.net, etc) may work fine. You use it to keep in touch with your family and friends, you get bills to that address, and you’ve used it to log in to your social media and online news and shopping sites. [Read more…]
by Tony Whitney
Companies that suffer security breaches nearly always have one of these IT security problems. Is your company guilty of any of them? [Read more…]
by Tony Whitney
Cybercrime is not the most costly of illegal activities. That dubious distinction goes to government corruption, followed by drug trafficking. Cybercrime comes in third. Yet cybercrime does take the top spot when it comes to number of victims. A managed services provider can help. [Read more…]
by Tony Whitney
(We reached into the files to bring this article written in 2016 back - please excuse the older statistics and just know that the number of attacks is increasing along with the ransom demands)
More and more businesses and organizations are getting stung by ransomware demands. Hospitals, schools, social networks…some days it seems like an epidemic that leaps around arbitrarily, and hackers are raking in millions. [Read more…]
by Tony Whitney
Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in 2016 alone. Here’s what you should consider if you’re ever in this situation. [Read more…]
by Tony Whitney
Anti-virus programs don’t catch viruses when they’re not running. Yes, it’s blatantly obvious, but what’s not always clear is how often your staff are disabling your anti-virus programs so they can squeeze in a little playtime. Maybe download and install a game, free app or get through the block to a suspicious website. It happens in businesses across the country, and more often than you think. It’s just human nature to see a problem and work around it, because surely their computer won’t be infected, those things only happen to other people. [Read more…]
by Tony Whitney
Have you ever thought about how much your data is worth? Information is possibly the most valuable part of your business – there’s your client database, accounting software and inventory management, and of course, any intellectual property you may own. When the ransomware, WannaCry, tore through the world recently, many businesses were suddenly forced to re-assess the value of their data: was it worth saving, and what would be the deeper cost of the attack? [Read more…]
by Tony Whitney
Most businesses are aware of the need for data backup. Without it, they risk losing important files in the event of a hard drive failure or cyberattack. Yet having a backup in place isn’t enough: it’s important also to test that backup. Ensure that you are able to restore that essential data when you need it. [Read more…]
by Tony Whitney
You love your technology and probably have a lot of it at home. You might not think of computers, smartphones, printers, or routers as a fire risk, but they can do real damage.
Microwaves, laundry machines, and air conditioners are the top sources of residential fires, but computer equipment is also responsible for fires that injure and kill homeowners.
So, what should you do? Keep in mind that your technology generates heat when it’s switched on; that’s why it’s designed with venting. But desktops, laptops, routers, modems, and printers can all overheat. [Read more…]