If I’ve seen it once, I’ve sent a thousand emails about it. Our typical client is somewhere around 10-25 computers with a couple servers and a bunch of network gear. Most commonly, we see non-profit organizations, retail stores and dental offices. In this blog post, we’re going to outline the 3 unmistakably most common dental office cybersecurity fails that we see on a monthly weekly basis. The first one is

In a recent blog post by NovaStor, they mention the idea that stressed out employees pose a risk to your data. On the surface, you can probably see what they’re talking about. From the examples in their latest blog, I wanted to dig a little deeper into this particular problem and see if we can’t explore what other companies are doing to mitigate some of that stress. Stressed out employees

Yes, it’s sort of cliche to start off an article about cybersecurity with a quote from The Art of War, but I think it’s ultimately worth reviewing. When you’re considering exploring an adversary mindset, you’re really practicing the old-time lessons of military leadership. Especially in the small business space, where cybersecurity is mostly offloaded to similarly small IT providers or ignored altogether, thought exercises are free and helpful. If you

A knock at the door drags me from my spot on the couch after a marathon of Mr. Robot plays out in front of me. A face I’ve never seen before through the tiny windows that flank my front door, but he looks friendly enough. “Hi, I’m Dropbox” With an exaggerated wave, the guy in front of me is obviously a sales rep of some sort. He’s incredibly friendly, beaming

I remember the land before social media. I was working at the Brantford YMCA as a coordinator for the summer camp program. Working in an office, getting ready to meet my counselors, my boss actually came into my room and asked if I was on Facebook. I wasn’t. She told me to get an account so we could be friends on the site, and I did – imagine that, a

Let’s come to terms here – the magical wizards that fix all the blinky lights can sometimes be hard to talk to. Especially if you find yourself hiring IT from an outside source, tech-focused people can often have a hard time breaking subjects down into manageable, relatable chunks. To make your life a little easier, here’s a few considerations for hiring IT. How easily can this company translate technical discussion

Only recently, hackers have been seen on television shows and movies behind walls of lime-green text and fast-scrolling code. As their fingertips clack away at breaking into some system, they’re usually passionately striking that last keystroke before announcing to the dark lit room; “I’m in!”. If it’s not a Matrix-inspired archetype, the hacker is usually portrayed as some shady character, silently sniffing your packets and harvesting your credit cards. This,

Managers have to wear many hats, requiring a multi-disciplinary knowledge base. Tech ownership in business means the amount of stuff we’re required to remember is starting to stack up. As it turns out, I’m one of those guys from IT, asking you to remember stuff. I commonly bring up ‘strong password’ rules and guidelines for keeping safe in an internet-connected world but, all too often, I get the same reaction