SMBs Can Become a Weapon in Cyberwarfare

Headlines today highlight Ukrainian tragedy or North Korea testing missiles. It can seem far away from your business, yet battles are being fought online, too. Your small business's IT systems could be weaponized for cyberwarfare. That statement may surprise you. You've heard of cyber targets such as: critical national infrastructure;election and v...
Continue reading
  15 Hits
15 Hits

Think Before Sharing That Link

Learning to share is an important early-life skill. Now, you've mastered it, and you're out in the workforce. Happily, digital technology makes it much easier to share business files, but that doesn't mean you want to do so willy-nilly. Consider these best practices for sharing with both internal and external users. Cloud sharing makes it simple to...
Continue reading
  47 Hits
47 Hits

Small Business Can’t Sacrifice Cybersecurity

Prioritise Cyber Security for your Small Business For small businesses, it can be tempting to postpone cybersecurity efforts. There are many common excuses: "There's so much to do," "There's not enough budget," "Our business is too small to target," etc. But right now, cybersecurity is a must-have for every business. Think of it like business ...
Continue reading
  80 Hits
80 Hits

Could the Business You Work for be More IT Savvy?

Working for a small business, you can be asked to wear many hats. Even if one of your many roles is not IT, you may need to speak up about your business technology or cybersecurity. It's easy to think cybersecurity is someone else's responsibility, but IT may not be getting the attention it deserves, and that could be damaging to the business, your...
Continue reading
  218 Hits
218 Hits

How to Prevent Password Spraying Attacks

Bad cyber actors are what the kids these days would call "try hards." They do everything they can think of to get into your accounts. One tactic is password spraying. In case you don't know about it, this article gives the basics and shares strategies to prevent this type of attack. You're probably familiar with hackers trying many different passwo...
Continue reading
  164 Hits
164 Hits

Ransomware a Risk for Your Home Computing

Ransomware headlines focus on interrupted hospital services or downtime at several major brands. But ransomware can just as easily infect your home computer. When you're a victim of ransomware, you aren't able to do anything on your computer. Cybercriminals encrypt your files and demand you pay a ransom to unlock your device. They'll ask for crypto...
Continue reading
  163 Hits
163 Hits

3 Reasons to Avoid Signing in With Facebook or Google Accounts

Nine out of ten times today when you visit a website you're asked to sign in. To add convenience, many sites offer the ability to sign in using a Facebook or Google account. Sure, it's simpler, but this article will share three key reasons why you might want to avoid this easy route. It's estimated that we each have an average of 100 passwords. Tha...
Continue reading
  76 Hits
76 Hits

How to Spot Email Spoofing

 The number of emails we get daily can be overwhelming. We could be excused for not looking at them all closely – well, almost. Except that not taking care to review emails for signs of spoofing could be a real risk to your business. Learn about email spoofing and how to avoid it in this article. How to Spot Email Spoofing First, what is email...
Continue reading
  204 Hits
204 Hits

Prepare Your IT for the Holiday Season

We all know about the Grinch who ruins Christmas for Whoville. Don't cast IT as the Grinch of this holiday season. Prepare your technology and systems to reduce downtime risk. You'll avoid disrupting your customers' holiday season or employees' seasonal fun. Update and upgrade IT Expecting an uptick in online shopping for the holidays? Apply system...
Continue reading
  173 Hits
173 Hits

Don’t Get Reeled in by Christmas Phishing Attacks

We expect the holiday season to be a time of good cheer, and peace and goodwill to all, right? Except cyberattackers didn't get the memo. They are more likely to attack businesses with phishing attempts during the holidays. Prevent issues by knowing what to expect. Cybercrime research shows the season "dramatically impacts" the volume of phishing a...
Continue reading
  309 Hits
309 Hits

Stay Safe Shopping Online This Festive Season

Retail research tells us that over 75% of people are shopping online each month, and, with the holiday season upon us, you're likely to be one of them. But don't let the appeal of convenience distract you from the need to stay safe when shopping online. The number of digital buyers is steadily climbing. In 2020, according to Statista, more than two...
Continue reading
  178 Hits
178 Hits

Quick Tip No. 84

 Don't always trust what you read online. It is possible for anyone to create a website on the Internet and it could be for malicious intentions. For example, a website could be created to help spread fear, lies, malware or to scam people.
  133 Hits
133 Hits

7 Common Business IT Myths Debunked

MythBuster programs on television never focus on business misconceptions about IT. Too bad, because believing these myths can be both costly and dangerous to your business. This article debunks seven common business IT myths. Sometimes myths are harmless, but when it comes to business IT myths, not knowing the truth is damaging. Make smarter tech d...
Continue reading
  236 Hits
236 Hits

Delivering SMS “Smishing” Scams

Smishing is high up on the list of words that do not sound as intimidating or threatening as they should. Smashing the word fishing together with the "SM" for short messaging service (aka text), smishing is a cyberscam. Especially with online shopping skyrocketing during the pandemic, delivery smishing has gained traction. Don't fall victim to...
Continue reading
  262 Hits
262 Hits

How Hackers Get Around SMS Two-Factor Authentication

Every time you're online and a site sends a separate code to check your identity, you're using two-factor authentication. It's become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe. With billions of usernames and passwords leaked, access credentials everywher...
Continue reading
  285 Hits
285 Hits

Beware These Social Media Scams

Huntington Volvo? Rowe Subaru? What will your hilarious quiz results be when you enter your fourth-grade teacher's name and first model of car? You may think it's silly entertainment … until it isn't. Many fun social media questionnaires are set up by hackers to steal your identity. It seems like a harmless collection of random facts from...
Continue reading
  224 Hits
224 Hits

What to Do If Your Data Is Included in a Leak

 

 

Data breaches are now daily occurrences and can happen to any business. The April 2021 leak of 533 million Facebook records was one of the largest known data leaks, but even if you weren't affected by that one, you may still be at risk.

 

There is no easy way to know if your information has been leaked. When a business is hacked, it typically sends a notification letting you know, but this isn’t guaranteed. And you can’t go in and check the Dark Web. It is difficult to find and dangerous to access, and that is why the bad guys like it.

Continue reading
  162 Hits
162 Hits

What to Do If You’re a Ransomware Victim

You'll know if you're a victim of ransomware. Often you're met with a red screen telling you your business files are encrypted. You won't be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Here's what to do instead if you're the victim of a ransomware attack. Cybersecur...
Continue reading
  225 Hits
225 Hits

Lessons Learned from an Oil Pipeline Ransomware Attack

Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but don't think that means ransomware can't happen to you, too. This article shares lessons learned from a headline-grabbing event, and they're applicable to businesses of all sizes in all industries. First, what happened? T...
Continue reading
  212 Hits
212 Hits

Stop Your Tech from Stalking You

Unless you're a reality television star, you probably don't like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it's far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon. Today's...
Continue reading
  197 Hits
197 Hits