Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company. This brief video courtesy of News24 discusses the scope of the incident, the kinds of information ...

Keep Reading

Cyber Security is Vital for Small Businesses

Small Business Tech Security Small businesses need to take cyber security seriously, preventing lapses or weak points that could lead to major data breaches or attacks.   Modern technology is rapidly changing the landscape for small businesses. Small companies can now do more and have a far greater reach, but they are also faced with bigger security concerns. What once was a big company issue is...

Keep Reading

How Do I Keep My Law Firm Secure?

Keep Your Law Firm Secure Solicitors often contact us for IT support. And, when they do, the first things they ask are, “How are you going to protect our legal practice? What tools will you use? How successful is your security solution for law firms?" The reason so many are searching for a better level of cybersecurity is pretty simple; they have read the news online about ransomware. They...

Keep Reading

The Complete Guide to Managing Popular Extensions Successfully

Protect Yourself from Potential Attacks Via Chrome Extensions Learn two simple ways to set the privacy and activity settings for each Google Chrome extension on your browser and steps the company is taking to protect users. Google’s Chrome web browser is a popular choice for businesses the world over. Managing the extensions gives you more control and faster results when using Chrome to its best...

Keep Reading

Law Firm Management Software: Top 3 Questions To Ask

Law Firm Management Software Finding the right firm management software is crucial, and it can also be straightforward if you know what you're looking for. What Are The Top 3 Questions To Ask When Choosing Firm Management Software? Need help choosing the right firm management software for your law firm? Check out the 3 questions below to know what you need to find out before making your selecti...

Keep Reading

How Do We Prepare Our Data For A Disaster? Questions and Answers

How Do We Prepare Our Data For A Disaster? Toronto firefighters responded to a dozen rescue calls on July 17th as a torrential downpour flooded multiple roadways and left some drivers stranded. Many areas saw more than 60 mm of rain, but it was heaviest in the west end. If your business is in this area, we hope you prepared your data with a Backup and Disaster Recovery Solution. What Is a Backup...

Keep Reading

Will Your Business Be Impacted by the End of Microsoft Exchange 2010?

Will Your Business Be Impacted by the End of Microsoft Exchange 2010? Exchange 2010 has been a great program for businesses for many years, but its time is now winding down. Find out what this means for your business.  All good things must come to an end. For Microsoft Exchange 2010, that end will happen at a date in the very near future: January 14, 2020. Migrating away from an integral piece o...

Keep Reading

How to Protect Your Business from SHTML Phishing

Protecting Your Data from SHTML Phishing Data security is vital to any business. Learn how SHTML phishing works and how to minimize the risk of your data falling into the hands of attackers. Email phishing has been in the playbook of hackers since, well, email. What’s alarming is the scope in which criminals can conduct these attacks, the amount of data potentially at risk, and how vulnerable m...

Keep Reading

URGENT/11 Zero-Day Vulnerabilities Impacting 2 Billion Devices

Check Your IoT: URGENT/11 Zero-Day Vulnerabilities Impacting 2 Billion Devices It was only a matter of time before connected devices become a target. The current vulnerability allows remote attackers to gain full control over IoT devices.   Security professionals have known that connected devices are a risk, but the latest news around the URGENT/11 vulnerabilities may surprise even the most hard...

Keep Reading

New Phishing Threat Presents Security Challenge

Phishing Attacks Target OAuth Credentials to Gain System Access Discover how an increasingly popular authentication process, OAuth, can be exploited by hackers and wreak havoc on applications and access sensitive data. What Is OAuth? OAuth is a widely used framework that allows applications to share access to assets. It lets unrelated services and servers to allow authentication without sharing t...

Keep Reading