Business Continuity

What’s Your Backup Plan?

You’ve made sure your car, house and business is protected with appropriate insurance but what have you done to protect the data on your computer? These days, replacing a computer is quick and relatively low cost but what would you do without the information stored on it? Ask anyone that has had a data loss…

Read More

Get your employees excited about IT Training

Get your employees excited about IT Training by Tristan Collopy Savvy business owners know that their employees can be their greatest strength and greatest weakness when it comes to information security. The difference between having employees that are security assets and security vulnerabilities comes down to one thing: training. Below, we’ll go over four ways…

Read More

How reliable is your backup?

If you are still reading this after reading my title, thank you — though I am sure you’re thinking why is there another article on backup, right? Though this topic has already been covered we are still finding companies not protected. In the last 3 months we have had 2 new customers come to us…

Read More

Patch right and keep hackers out

used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are working to make patching easier and more trustworthy – like Microsoft and its…

Read More

7 Ways to Protect Your Small Business from Fraud and Cybercrime

used with permission from SBA.gov by Caron Beesley How secure are your small business assets from fraud, identity theft and cybercrime? According to the Association of Certified Fraud Examiners (ACFE), companies with less than 100 employees lose approximately $155,000 as a result of fraud each year. Small businesses also have a higher fraud rate than…

Read More

Online Fraud and Identity Theft

used with permission from Norton by Symantec Online fraud is a type of cybercrime that uses email, web sites, chat rooms or message boards. There are many different types of online fraud, including phishing and pharming scams, which use forged e-mails and Web sites to trick recipients into giving out personal information such as credit…

Read More

Protecting Your Phone and Tablet from Loss, Theft and Attacks

used with permission from Norton by Symantec Our phones are not just phones anymore. That ‘phone’ that you use to stay in touch with people is actually a little computer (let’s call it a ‘mobile device’) containing valuable information about you, your family, your friends, and your life. Can you imagine losing your mobile device? …

Read More

Get smart about security

used with permission from HP Technology at Work Congratulations, you’ve taken every step to secure data on your networks and PCs against increasingly malicious worms, Trojans and viruses. But don’t rest easy. All infrastructure elements, including printers, servers, storage, Wi-Fi networks and cloud computing are just as susceptible to surprising security threats. Forget them and…

Read More

Business Continuity Tip – Cybercrime Goes Mobile

Business Continuity Tip Mobile devices have become an essential tool for everyday life. We check in for flights, make online purchases, access bank accounts, and connect to social media all on mobile-enhanced websites and newly developed applications. The worldwide adoption of the smartphone has prompted cybercriminals to shift their focus toward mobile users and away…

Read More

Business Continuity Planning: Just the Basics

by Stefani Laszko Business Continuity Planning (BCP) is a pretty daunting topic. Simply asking ‘where do I start?’ is enough to make most business owners run and hide. Regardless, it is a crucial component to the longevity of your business and it cannot be ignored.  A well written BCP can consist of hundreds of pages…

Read More