Monitor the dark web with 365 Sentinel

The dark web: How to monitor and implement security protocols

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Ransomware

If you think the regular web is dark, you don’t want to see the dark web. It may be time to proactively monitor your organization’s email addresses and domains to ensure you’re not already on the dark web and implement security protocols to ensure you never end up there. The dark web is not indexed by Internet search engines; instead, …

Remote Worker Cybersecurity

Cybersecurity tips for remote workers

Michael Anderson Cybersecurity, IT Best Practices, IT Managed Services, IT Security, Remote Working

Moving to a home office can be overwhelming and create cybersecurity issues for you, your team and organization – particularly on short notice! Here are some tips to make your home office and organization more secure: Virtual Private Network (VPN): Provide a VPN for staff to connect securely to your organization’s network. Remote-work plan: If you have a remote-work plan, …

Lessons learned from the Canva hack

Lessons from the Canva hack

Michael Anderson IT Best Practices, IT Security

We recently discovered one of our email addresses on the dark web following a hack of Canva, an Australian-based company that provides a simplified web design tool. In May, hackers breached Canva’s data, leaving approximately 139 million users’ data compromised, including names, usernames, email addresses, city, and country information. Although Canva has confirmed hackers didn’t access passwords, it still urged …

Seven Cybersecurity Threats

7 under-the-radar cybersecurity threats

Michael Anderson Cybersecurity, IT Best Practices, IT Managed Services, IT Security

Some cyberthreats get all the publicity. So, it’s great that Wired recently published an article about seven lesser-known cybersecurity threats that everyone should know about; true, they may not be as “newsworthy” as ransomware attacks and data breaches, but they can do serious damage to your data and privacy nonetheless. Read the full article here. Here is a summary of …