Close

What Is Smishing?

What Is Smishing? Phishing attacks have been on the rise recently, as criminals increasingly target unsuspecting victims through email and other online platforms. A new phishing attack is emerging using mobile phones as the platform. Smishing is a form of phishing that uses text messages or SMS as the delivery method. The criminal executes the attack with the intent to gather personal informatio...

Keep Reading

What Small Businesses Need To Consider When Outsourcing The Security Of Their Business Network

What Small Businesses Need To Consider When Outsourcing The Security Of Their Business Network Small businesses are the backbone of the economy, but they face unique challenges regarding cybersecurity. Unlike large corporations, small businesses often lack the resources and expertise to defend themselves effectively against increasingly sophisticated cyber attacks. As a result, small businesses ...

Keep Reading

How Small Businesses Can Protect Themselves From Ransomware

How Small Businesses Can Protect Themselves From Ransomware It’s a common misconception that small businesses aren’t typical victims of cyber attacks or data breaches. Sophisticated cyber-attacks often target small businesses because they lack resources and knowledge regarding cybersecurity. One particularly damaging type of malware is known as ransomware. Ransomware is malware that encrypts...

Keep Reading

Small Business Guide To Microsoft Azure Virtual Desktop

Small Business Guide To Microsoft Azure Virtual Desktop The business world is becoming increasingly digital. Since the COVID-19 pandemic began, many companies have moved into work-from-home situations, which has made remote and hybrid working environments more desirable and commonplace for workers across the country. The modern workforce is more flexible and mobile than ever, and businesses need ...

Keep Reading

Cyber Security Services

How Long Has It Been Since Your IT Environment Was Evaluated by a Cybersecurity Professional? -- Cyber, Computer, Network Security Solutions We see it all the time. Company leaders want to move their workflow to the next level of productivity but aren’t quite sure what that means for their cybersecurity posture. That’s okay. You don’t have to be an expert in cyber, computer, and networ...

Keep Reading

Log4Shell – Update #2

Log4Shell - Update #2 Security Advisory Nickname: Log4Shell Security Advisory Name: CVE-2021-44228 Security Advisory Update Number: 2 Security Advisory Link(s): http://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228, https://nvd.nist.gov/vuln/detail/CVE-2021-44228 Security Advisory Severity: CRITICAL What has changed since the last update?  A new 2.16.0+ version o...

Keep Reading

CRITICAL Sysoft Security Advisory – CVE-2021-44228

Security Advisory Nickname: Log4Shell Security Advisory Name: CVE-2021-44228 Security Advisory Link(s): http://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228, https://nvd.nist.gov/vuln/detail/CVE-2021-44228 Security Advisory Severity: CRITICAL First of all, what is this CVE-2021-44228 all about? A serious vulnerability has been found in Log4j which is a logging tool, Java library, i...

Keep Reading

Sure Your Microsoft 365 Data Is Backed Up?

Are You Sure Your Microsoft 365 Data Is Backed Up? Just because you use Microsoft 365 — a service that automatically handles many different vital tasks according to industry best practices — doesn’t necessarily mean your data is backed up the way it should be. Do you know if your Microsoft 365 data is backed up? All of it? Your first thought is probably, "yes, of course it is"… but ...

Keep Reading

Kaseya Ransomware: Impact Felt In Toronto

ALERT: You Could Be Infected With Ransomware Right Now — Does Your Toronto IT Company Use Kaseya VSA? You need to find out if your Toronto IT company uses Kaseya’s VSA platform right away — if they do, your business could be infected with ransomware. Get in touch with your Toronto IT company right now and find out. This past weekend, a ransomware attack on Kaseya’s remote monitoring VS...

Keep Reading

Sysoft Saved GAB Law Firm Just As They Launched Their Business

Sysoft Saved GAB Law Firm Just As They Launched Their Business Today, GAB Law Firm is an active and successful labour and employment firm, practicing out of Mississaugua with a small staff. They represent both employees and employers in wrongful dismissal suits, as well as work with unionized employees and employers. While you wouldn’t know it from their success today, three years ago, GAB L...

Keep Reading

Malicious Apps Are Putting Microsoft 365 Users At Risk

Malicious Apps Are Putting Microsoft 365 Users At Risk Phishers have discovered a new way to get around cybersecurity defenses with malicious apps designed for Microsoft 365. Do you know how to protect against this new attack vector? Cybercriminals are forever on the hunt for new tools and methods to help them breach secure accounts, access sensitive data, and do damage to users like you. T...

Keep Reading

Microsoft Excel: Getting Started With Pivot Tables

Microsoft Excel: Getting Started With Pivot Tables Using pivot tables in Microsoft Excel can help you become more organized when dealing with your organization’s data. Pivot tables make the analysis, storage, and comprehension of data much easier, allowing you to better understand your business. In this video, we discuss how to use pivot tables if you are not yet familiar with them.  Und...

Keep Reading