Jun 2020
If I’ve seen it once, I’ve sent a thousand emails about it. Our typical client is somewhere around 10-25 computers with a couple servers and a bunch of network gear. Most commonly, we see non-profit organizations, retail stores and dental offices. In this blog post, we’re going to outline the 3 unmistakably most common dental office cybersecurity fails that we see on a monthly weekly basis. The first one is
In a recent blog post by NovaStor, they mention the idea that stressed out employees pose a risk to your data. On the surface, you can probably see what they’re talking about. From the examples in their latest blog, I wanted to dig a little deeper into this particular problem and see if we can’t explore what other companies are doing to mitigate some of that stress. Stressed out employees
Jun 2020
Yes, it’s sort of cliche to start off an article about cybersecurity with a quote from The Art of War, but I think it’s ultimately worth reviewing. When you’re considering exploring an adversary mindset, you’re really practicing the old-time lessons of military leadership. Especially in the small business space, where cybersecurity is mostly offloaded to similarly small IT providers or ignored altogether, thought exercises are free and helpful. If you
Jun 2020
A knock at the door drags me from my spot on the couch after a marathon of Mr. Robot plays out in front of me. A face I’ve never seen before through the tiny windows that flank my front door, but he looks friendly enough. “Hi, I’m Dropbox” With an exaggerated wave, the guy in front of me is obviously a sales rep of some sort. He’s incredibly friendly, beaming
Jun 2020
I remember the land before social media. I was working at the Brantford YMCA as a coordinator for the summer camp program. Working in an office, getting ready to meet my counselors, my boss actually came into my room and asked if I was on Facebook. I wasn’t. She told me to get an account so we could be friends on the site, and I did – imagine that, a
Jun 2020
Let’s come to terms here – the magical wizards that fix all the blinky lights can sometimes be hard to talk to. Especially if you find yourself hiring IT from an outside source, tech-focused people can often have a hard time breaking subjects down into manageable, relatable chunks. To make your life a little easier, here’s a few considerations for hiring IT. How easily can this company translate technical discussion
Jun 2020
Only recently, hackers have been seen on television shows and movies behind walls of lime-green text and fast-scrolling code. As their fingertips clack away at breaking into some system, they’re usually passionately striking that last keystroke before announcing to the dark lit room; “I’m in!”. If it’s not a Matrix-inspired archetype, the hacker is usually portrayed as some shady character, silently sniffing your packets and harvesting your credit cards. This,
Jun 2020
Managers have to wear many hats, requiring a multi-disciplinary knowledge base. Tech ownership in business means the amount of stuff we’re required to remember is starting to stack up. As it turns out, I’m one of those guys from IT, asking you to remember stuff. I commonly bring up ‘strong password’ rules and guidelines for keeping safe in an internet-connected world but, all too often, I get the same reaction