Seven Cybersecurity Threats

7 under-the-radar cybersecurity threats

Michael Anderson IT Best Practices, IT Managed Services, IT Security

Some cyberthreats get all the publicity. So, it’s great that Wired recently published an article about seven lesser-known cybersecurity threats that everyone should know about; true, they may not be as “newsworthy” as ransomware attacks and data breaches, but they can do serious damage to your data and privacy nonetheless. Read the full article here. Here is a summary of …

Ransomware Stats

Ransomware stats and facts

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Ransomware

When ransomware attacks, it can be costly in many ways. To understand the real impact of ransomware, we’ve summarized Comparitch’s article, “2017-2019 Ransomware statistics and facts.” When ransomware encrypts a computer file system it can cause irreversible data loss. Even more alarming, cybercriminals are increasingly using ransomware to freeze systems and extract money from their victims. Ransomware losses for businesses …

5G wireless network

The age of 5G is upon us – but will it deliver?

Michael Anderson Business Talk, IT Best Practices, IT Managed Services

Some are calling the advent and rollout of 5G the fourth industrial revolution. Can it possibly live up to the hype? Yes, 5G connectivity sounds pretty exciting. It promises a new era of cellular wireless networks and digital connectedness that includes faster mobile data access and better connectivity for your wireless devices. It could, in theory, mean downloading a two-hour …

Phishing attacks on the rise

Five ways to spot phishing email scams

Michael Anderson IT Best Practices, IT Security

Phishing email scams are getting sneaker and harder to recognize. Phishing is a fraudulent attempt to obtain sensitive information (such as usernames, passwords, or credit card details) by posing as a trustworthy entity or person in electronic communication. The fraudsters’ aim is to lure their victims into clicking malicious URLs or email attachments to get personal data. “Business email compromise …

FaceApp Privacy Concerns

FaceApp spurs privacy concerns, but so should others

Michael Anderson IT Best Practices, IT Security

You might want to rethink trying out FaceApp – the app that purports to age your face – but it’s really just the tip of the user-beware iceberg. FaceApp is the latest online craze that turned into an online panic when a developer warned that the app, based in Russia, could take photos from your phone and upload them to …

IT Support – Best Option

IT support: what’s the best option for your business?

Michael Anderson Business Talk, IT Best Practices, IT Managed Services

You have lots of IT-support options these days, some of which may be better choices than others. Generally speaking, you can break down IT support into three categories: The one-person show Pay-per-hour versus break-fix option A managed service provider solution Which one is right for your business? We outline the pros and cons, below. 1. The One-Person Show When we …

Jessica Floresco, General Manager

365 Technologies teams up with Mother Earth Recycling

Michael Anderson 365 News, Culture, Green Technology, Hardware, IT Best Practices, IT Security

Our old hardware is going to a new home with a big heart 365 Technologies has teamed up with Mother Earth Recycling to recycle its old electronic equipment. “We usually recycle 200 to 300 computers a year,” says Michael Anderson, President and CEO of 365 Technologies. “This year, with Windows 7 support ending, that number will be closer to 400 to …

Virtual Chief Information Officer

Three benefits of hiring a virtual Chief Information Officer

Michael Anderson IT Best Practices, IT Managed Services

The three benefits of hiring a virtual Chief Information Officer to manage your IT services If you’re running a small- to medium-sized business, and you need a trusted advisor to help manage your IT networks, backup and recovery systems, you could benefit from having a Virtual Chief Information Officer, or vCIO from 365 Technologies. vCIOs are highly skilled and specialized consultants …

Gift Card Scam

Gift card scam uses boss’ email address

Michael Anderson IT Best Practices, IT Security

Sometimes it’s good to question the boss. If you get an email from your boss asking you to purchase gift cards, you may really be communicating with scammers. For the past six months or so, there’s been an email scam from “bosses” requesting that you purchase gift cards on their behalf. It’s a more sophisticated version of the traditional email …

Free Wi-Fi – Be Careful

Be careful about using public Wi-Fi

Michael Anderson IT Best Practices, IT Security

Would you like some free Wi-Fi with your coffee? Odds are, the last time you were at a coffee shop, you thought, “I’m paying for the coffee – I might as well use the free Wi-Fi.” There’s no doubt that Wireless Internet, or Wi-Fi, connections are everyone’s favourite free service. However, using free, public Wi-Fi is dangerous, especially for a …