Blog
A Key For Your Digital Life
You have a key to secure your home with a rise in cybercrime, you should also have a key to secure your digital life as well. Meet YubiKey. At the price point of around $50. This hardware device allows you to implement...
How to disable that annoying beep when you adjust your Windows sound
Here is a quick guide on how to disable that annoying beep when you adjust your sound. I don’t know about you, but the beep in Windows when I change the volume has always driven me crazy. 1. Open your start menu. Start to type...
10 Apps you didn’t know you had in your Microsoft 365 subscription
Want to save time and boost productivity? You probably use Word and Excel on the daily and maybe Teams. However, there are numerous apps included in your current subscription that may solve some of your productivity...
Do your logs matter? Using Syslog for better logging
Do your logs matter? Using Syslog for better logging One of the things that can be overlooked in IT is proper logging. This is incredibly important and should not be neglected. Without proper logging in your IT environment, if...
Are your third-party vendors a security risk?
Your business most likely relies on third party vendors. Have you considered that partnering with the wrong vendor could result in financial losses and serious damage to your company’s reputation? Hackers intentionally go after...
What exactly is Mobile Device Management (MDM)?
What exactly is Mobile Device Management (MDM)? In many organizations, employees have mobile devices that they use to do their jobs. Those mobile devices can be tablets, smartphones, or other devices. To be able to manage...
Business Email Scams, Whats the Cost?
What is a Business Email Compromise Attack? Business email compromises are when an attacker impersonates the real owner of an email account to defraud the company, its customers, partners, or employees into sending money or...
Do you need Cybersecurity Insurance?
Emerging trends Recent surveys show that nearly 50% of companies have cyber insurance policies, up considerably from just a few years ago. While insurance is nice to have there is no replacement for a proper cybersecurity...
7 Essential Tips to Combat Ransomware
A record-setting Year According to cybersecurity experts, there were two pandemics last year, one was COVID-19 and the other was cyber fraud. The FBI Internet Crime Complaint Center reported that in 2020 alone, there were...
How to bypass Office 365’s 90 day log limit
How to bypass Office 365’s 90-day log limit When responding to an O365(office 365) data breach, depending on how quickly the breach was discovered, you may need to go further back than the 90 days that are allowed by default....
Why use a Managed Security Provider?
Emerging Threats Cybercrime costs have increased by over 400% in the past two years. Hardly a week goes by without news of another data breach, ransomware attack, or cyber attack making front-page news. Analysts predict that...
Why use a Password Manager?
Why Use a Password Manager? I bet you use the same password across multiple websites, am I right? If you ask people if they like passwords most will say No. However, if you ask people if they like their password manager, many...
Have your passwords been leaked?
Data breaches happen more often than we know. Your passwords to different websites are often stolen and available to hackers on the internet. There is a website that lets you check this; it is called Have I Been Pwned. It lets...
What is Two-factor Authentication?
Passwords are everywhere. We use them to access our money, chat apps, even our social lives through social media. No matter how complex your password is, it is never enough to prevent account takeover because all it takes was...
Passwords are outdated, you need a physical security key.
I have bad news for you. If your password is weak, you are probably going to get hacked. What if I told you there was a key to outsmarting hackers? It's called a security key. It could be the answer to securing your entire...
4 Simple Tips to Protect Yourself Online
Use two-factor authentication(2FA/MFA) Use 2FA/MFA everywhere that you can. Your banking systems, Twitter, and Facebook all support the ability for you to enable an additional security feature that you may not be using. You can...
How can the principle of least privilege protect your company?
How can the principle of least privilege protect your company? The principle of least privilege is widely used in IT security. It can go a long way to reduce the damage an attacker can do if you do have a security incident at...