Education Centre

Is Your Tech Firm Conducting Quarterly Technology Reviews?

Is Your Tech Firm Conducting Quarterly Technology Reviews?

No matter the line of business you’re in, outsourcing your IT services to a managed service provider (MSP) provides a world of benefits. Both your internal systems and your online presence will be optimized and streamlined, tech problems will be taken care of right away, and you’ll have more time to focus on what matters. […]

read more
A Quick Guide For Buying A New Home Computer

A Quick Guide For Buying A New Home Computer

Looking for a new computer for your home office? Year-end sales and tax returns often lead to boosted sales in computers. But purchasing a new computer can feel overwhelming. The technology changes quickly and the jargon can be confusing. Here is an explanation of what you want to consider when looking at getting a new […]

read more
How Can You Stay Safe From Phishing Attempts? Try These 7 Tips

How Can You Stay Safe From Phishing Attempts? Try These 7 Tips

In this article, we’ll be going over the top seven ways to protect yourself and your business from email phishing attempts. But first, what is phishing? Phishing Defined Although it may sound like a recreational sport, phishing is not a virtuous practice. It is, instead, the deceitful and illegal practice of trying to obtain personal information […]

read more
FTC Issues Warning After Marriott Data Breach

FTC Issues Warning After Marriott Data Breach

In late 2018, the Federal Trade Commission (FTC) issued a stark warning about a massive data breach at a Marriott chain that exposed the records of 500 million people. The latest major corporate breach reinforces the need for companies to invest in multilayered security protocols that protect networks, devices and users. What Happened at Marriott? […]

read more
What Everyone Should Know About Drive Cloning?

What Everyone Should Know About Drive Cloning?

Disk cloning involves copying the contents of a hard drive to a replacement hard drive. It includes the file structure and system files and is used for a backup to upgrade, restore or move the drive data. The contents are typically written to one image file, which allows you to do the upgrade or restoration […]

read more
If You Don’t Think Cybersecurity Is Crucial – Listen To This

If You Don’t Think Cybersecurity Is Crucial – Listen To This

Small and mid-sized companies have a tendency to operate under the assumption that hackers target only more extensive operations. There’s a simple logic to that misconception that these criminals instigate cyber breaches that reap the highest possible reward. Nothing could be further from the truth. Check out what Robert Herjavec and Scott Schober have to […]

read more
DHS/FBI Issue Critical Alert: SamSam Ransomware

DHS/FBI Issue Critical Alert: SamSam Ransomware

The FBI and Department of Homeland Security (DHS) have issued a vital ransomware alert for the SamSam ransomware also known as MSIL/Samas.A. The FBI and DHS alert, issued on November 3rd, 2018 describes how hackers armed with SamSam ransomware have targeted multiple industries, including some within critical infrastructure. Those victimized by SamSam have been located predominately […]

read more
Marriott 500 Million Person Data Breach (Questions/Answers)

Marriott 500 Million Person Data Breach (Questions/Answers)

How Marriott Got Caught In A 500-Million Person Data Breach Were You Affected? (Your Questions Answered) What Do We Need To Know About The Marriott Breach? Another big corporation got hooked. This time it was Marriott International. They just revealed that their Starwood reservations database of 500 million customers was hacked and that the personal […]

read more
Is Your Company Phone Line A Potential Security Risk?

Is Your Company Phone Line A Potential Security Risk?

It seems like every week, a new, high-profile data breach is in the news. Both national and international companies alike can be hacked at any time, putting clients and customers in danger of having their financial and personal information used by criminals. Likewise, breaches like these pose real threats to the stability of a company. […]

read more
6 Tips To Ensure Third-Party Security

6 Tips To Ensure Third-Party Security

Businesses of all types and sizes today must navigate a complex matrix of vendors and partners. In many cases, there is frequent sharing of data, including sensitive and proprietary information, that could be problematic if hacked or stolen. The advent of new technologies, including the Internet of Things, automation and cloud systems, make for the […]

read more
Top Data Breaches In The First Half Of November 2018

Top Data Breaches In The First Half Of November 2018

Data breaches never fail to stay at the top of news headlines, and these are news headlines that should be highly regarded if you are a business owner. According to the ID Theft Center, there were at least 1,579 breaches, which was a 44.7 percent increase from the year before. A Look at Early November 2018 […]

read more

Search Our Tech Insights