One aspect of our most recent offering – an active adversary phishing simulation – is the tracking we perform on a very certain metric. When we’re engaging a business to measure their response to phishing attempts by bad guys, we carefully track the ‘clicks‘ on the links we send. In other words, we want to know when users click on links. Knowing that, we know who needs specific training on

Social Media Security is a topic that affects everybody. You might think that by not having an account on a popular social media site, you’re safe from the same type of social engineering attacks that affect active users. That might be just the kind of reaction a social engineer is looking for. Cybersecurity is usually seen as a series of blinking lights – little devices that sit in a server

More often than not, we bump into business owners that have some idea about who’s backing up their data, but very rarely do we meet team leaders with a clear picture of their backup schema. Offsite backups are generally a ‘set it and forget it’ appliance. They should be – especially managed backups. That is, after all, what you’re paying for. In the height of a crisis, we’re the people

If I’ve seen it once, I’ve sent a thousand emails about it. Our typical client is somewhere around 10-25 computers with a couple servers and a bunch of network gear. Most commonly, we see non-profit organizations, retail stores and dental offices. In this blog post, we’re going to outline the 3 unmistakably most common dental office cybersecurity fails that we see on a monthly weekly basis. The first one is

In a recent blog post by NovaStor, they mention the idea that stressed out employees pose a risk to your data. On the surface, you can probably see what they’re talking about. From the examples in their latest blog, I wanted to dig a little deeper into this particular problem and see if we can’t explore what other companies are doing to mitigate some of that stress. Stressed out employees

Yes, it’s sort of cliche to start off an article about cybersecurity with a quote from The Art of War, but I think it’s ultimately worth reviewing. When you’re considering exploring an adversary mindset, you’re really practicing the old-time lessons of military leadership. Especially in the small business space, where cybersecurity is mostly offloaded to similarly small IT providers or ignored altogether, thought exercises are free and helpful. If you

A knock at the door drags me from my spot on the couch after a marathon of Mr. Robot plays out in front of me. A face I’ve never seen before through the tiny windows that flank my front door, but he looks friendly enough. “Hi, I’m Dropbox” With an exaggerated wave, the guy in front of me is obviously a sales rep of some sort. He’s incredibly friendly, beaming

I remember the land before social media. I was working at the Brantford YMCA as a coordinator for the summer camp program. Working in an office, getting ready to meet my counselors, my boss actually came into my room and asked if I was on Facebook. I wasn’t. She told me to get an account so we could be friends on the site, and I did – imagine that, a

Let’s come to terms here – the magical wizards that fix all the blinky lights can sometimes be hard to talk to. Especially if you find yourself hiring IT from an outside source, tech-focused people can often have a hard time breaking subjects down into manageable, relatable chunks. To make your life a little easier, here’s a few considerations for hiring IT. How easily can this company translate technical discussion

Only recently, hackers have been seen on television shows and movies behind walls of lime-green text and fast-scrolling code. As their fingertips clack away at breaking into some system, they’re usually passionately striking that last keystroke before announcing to the dark lit room; “I’m in!”. If it’s not a Matrix-inspired archetype, the hacker is usually portrayed as some shady character, silently sniffing your packets and harvesting your credit cards. This,