by Jeff Heather | Apr 27, 2020 | Blog
Ransomware Part IIIn our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim.Prevention is the best cure. Follow standard “data hygiene” principles that you...
by Jeff Heather | Apr 20, 2020 | Blog
Ransomware part IThe daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your...
by Jeff Heather | Apr 7, 2020 | Blog
Multi-factor Authentication DemystifiedYou have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. So, what is multi-factor authentication, exactly? Read this...
by Jeff Heather | Mar 31, 2020 | Blog
4 Lesser-known benefits of hiring an MSPYou are probably aware of the most common benefits of signing up with an MSP such as On-demand IT support: Having an MSP ensures that you get priority IT support when you need it. Scalable IT infrastructure: With an MSP by your...
by Jeff Heather | Mar 24, 2020 | Blog
Dark web monitoring: What you need to knowThe dark web is essentially a marketplace for cyber criminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold by miscreants, to miscreants, who can later hack into your system...
by Jeff Heather | Mar 17, 2020 | Blog
The dark web: An introductionHave you come across the term, dark web, recently? As a business, you might have heard that you need to keep your data safe from the dark web. So, what is the dark web anyway? Read on to find out…What is the dark web?The cybercrime...
Recent Comments