MSPs – the next, great cyberattack?

Michael Anderson Cybersecurity, IT Security, Tech Articles

The cyber war may be coming to your IT-managed service provider. Is your MSP ready? Look no further than the recent cyberattack on SolarWinds, an IT-infrastructure management software company that works with technology and IT-managed service providers. It appears that hackers are breaking into MSPs in order to attack as many company networks as possible in one swoop. As mentioned…

Monitor the dark web with 365 Sentinel

The dark web: How to monitor and implement security protocols

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Ransomware

If you think the regular web is dark, you don’t want to see the dark web. It may be time to proactively monitor your organization’s email addresses and domains to ensure you’re not already on the dark web and implement security protocols to ensure you never end up there. The dark web is not indexed by Internet search engines; instead,…

Remote Worker Cybersecurity

Cybersecurity tips for remote workers

Michael Anderson Cybersecurity, IT Best Practices, IT Managed Services, IT Security, Remote Working

Moving to a home office can be overwhelming and create cybersecurity issues for you, your team and organization – particularly on short notice! Here are some tips to make your home office and organization more secure: Virtual Private Network (VPN): Provide a VPN for staff to connect securely to your organization’s network. Remote-work plan: If you have a remote-work plan,…

Lessons learned from the Canva hack

Lessons from the Canva hack

Michael Anderson IT Best Practices, IT Security

We recently discovered one of our email addresses on the dark web following a hack of Canva, an Australian-based company that provides a simplified web design tool. In May, hackers breached Canva’s data, leaving approximately 139 million users’ data compromised, including names, usernames, email addresses, city, and country information. Although Canva has confirmed hackers didn’t access passwords, it still urged…

Seven Cybersecurity Threats

7 under-the-radar cybersecurity threats

Michael Anderson Cybersecurity, IT Best Practices, IT Managed Services, IT Security

Some cyberthreats get all the publicity. So, it’s great that Wired recently published an article about seven lesser-known cybersecurity threats that everyone should know about; true, they may not be as “newsworthy” as ransomware attacks and data breaches, but they can do serious damage to your data and privacy nonetheless. Read the full article here. Here is a summary of…

Ransomware Stats

Ransomware stats and facts

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Ransomware

When ransomware attacks, it can be costly in many ways. To understand the real impact of ransomware, we’ve summarized Comparitch’s article, “2017-2019 Ransomware statistics and facts.” When ransomware encrypts a computer file system it can cause irreversible data loss. Even more alarming, cybercriminals are increasingly using ransomware to freeze systems and extract money from their victims. Ransomware losses for businesses…

Phishing attacks on the rise

Five ways to spot phishing email scams

Michael Anderson IT Best Practices, IT Security

Phishing email scams are getting sneaker and harder to recognize. Phishing is a fraudulent attempt to obtain sensitive information (such as usernames, passwords, or credit card details) by posing as a trustworthy entity or person in electronic communication. The fraudsters’ aim is to lure their victims into clicking malicious URLs or email attachments to get personal data. “Business email compromise…

Gift Card Scam

Gift card scam uses boss’ email address

Michael Anderson IT Best Practices, IT Security

Sometimes it’s good to question the boss. If you get an email from your boss asking you to purchase gift cards, you may really be communicating with scammers. For the past six months or so, there’s been an email scam from “bosses” requesting that you purchase gift cards on their behalf. It’s a more sophisticated version of the traditional email…

Protect Your PC

Protect your PC by doing these three, simple things

Michael Anderson IT Best Practices, IT Security

A couple of years ago, I wrote a post about how to keep your PC running in tip-top shape. These tips continue to be important to ensure your PC has a long life, so I’m reposting it today with some updates. Tip #1: Protect your PC with a surge protector Your home’s electrical outlets don’t provide a constant and consistent…