Phishing attacks on the rise

Five ways to spot phishing email scams

Michael Anderson IT Best Practices, IT Security

Phishing email scams are getting sneaker and harder to recognize. Phishing is a fraudulent attempt to obtain sensitive information (such as usernames, passwords, or credit card details) by posing as a trustworthy entity or person in electronic communication. The fraudsters’ aim is to lure their victims into clicking malicious URLs or email attachments to get personal data. “Business email compromise…

FaceApp Privacy Concerns

FaceApp spurs privacy concerns, but so should others

Michael Anderson IT Best Practices, IT Security

You might want to rethink trying out FaceApp – the app that purports to age your face – but it’s really just the tip of the user-beware iceberg. FaceApp is the latest online craze that turned into an online panic when a developer warned that the app, based in Russia, could take photos from your phone and upload them to…

Gift Card Scam

Gift card scam uses boss’ email address

Michael Anderson IT Best Practices, IT Security

Sometimes it’s good to question the boss. If you get an email from your boss asking you to purchase gift cards, you may really be communicating with scammers. For the past six months or so, there’s been an email scam from “bosses” requesting that you purchase gift cards on their behalf. It’s a more sophisticated version of the traditional email…

Free Wi-Fi – Be Careful

Be careful about using public Wi-Fi

Michael Anderson IT Best Practices, IT Security

Would you like some free Wi-Fi with your coffee? Odds are, the last time you were at a coffee shop, you thought, “I’m paying for the coffee – I might as well use the free Wi-Fi.” There’s no doubt that Wireless Internet, or Wi-Fi, connections are everyone’s favourite free service. However, using free, public Wi-Fi is dangerous, especially for a…

IT Security Audits

Securing your network data begins with an IT security audit

Michael Anderson IT Best Practices, IT Managed Services, IT Security

The growing complexity of cloud services, data networks, and disaster-recovery backup services make comprehensive IT security audits a must for business owners – without an audit, your business may be at serious risk. Why your business needs an IT security audit: 1. Your data is more valuable than ever Malicious hacks and ransomware, such as Cryptolocker, cause downtime and are…

Protect Your PC

Protect your PC by doing these three, simple things

Michael Anderson IT Best Practices, IT Security

A couple of years ago, I wrote a post about how to keep your PC running in tip-top shape. These tips continue to be important to ensure your PC has a long life, so I’m reposting it today with some updates. Tip #1: Protect your PC with a surge protector Your home’s electrical outlets don’t provide a constant and consistent…

Three Dangers of Running an Unsupported Operating System

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Software

“Nothing lasts forever.” – every IT professional Truer words were never spoken, as constant innovations in computers, software, and systems phase out older IT infrastructure. This can pose a problem for small- to medium-sized businesses with tight IT budgets. With limited funds, how do you keep a strategic IT technology plan to standards, yet provide your IT infrastructure with the…

12 Network Tests

12 Tests to Boost your Network Security

Michael Anderson Cybersecurity, IT Managed Services, IT Security

Network security not only protects your business’ data and systems, but makes it more efficient, organized, and profitable. Here are 12 tests you can perform to make sure your network security is as strong as it needs to be: 1. Network Layer Vulnerability Scanning: Uses a network layer Vulnerability Assessment (VA) scanner. Why use it? Vulnerability scanners identify security risks on every…

Ransomware Security

Five ways to protect your business from ransomware

Michael Anderson Cybersecurity, Disaster Recovery, IT Managed Services, IT Security

When it comes to cyberthreats, there is a lot to think about – from Trojan horses to worms. In 2017, ransomware attacks rose an astounding 250 per cent, according to AO Kaspersky Lab (2017): IT Threat Evolution Q1 2017. Ransomware is a type of malicious software that encrypts critical data on computers or mobile devices and blocks the owner from…