IT News, Information and Tech Tips For Toronto Business

Blog Thumbnail

6.8M Facebook Users Hit By New Photo Bug

Facebook has just announced that a Photo API bug gave app developers access to user photos outside of the scope intended for 5.6 million users. This includes granting apps access to Facebook Stories, Marketplace photos, and photos that were uploaded but not shared. The bug was in effect from September 13th to September 25th. As […]

Keep Reading

Blog Thumbnail

Top 5 Cybersecurity Predictions For 2019

Cyber threats are a genuine danger for businesses, no matter their size or industry. Companies that face data breaches are likely to fail within months after the attack, according to the National Cyber Security Alliance. Security issues can ruin your reputation and cause expensive damage to your company. In 2019, we are already predicting increased […]

Keep Reading

Blog Thumbnail

Employee Benefits & Cyber Attacks (Questions/Answers)

Your employees may understand that they risk identity theft every time there’s a major cyber breach at a store they’ve patronized. But do they know that even more of their personal information is available to hackers via their employee benefits plans? It’s a risk that an increasing number of business owners and CEOs have had […]

Keep Reading

Blog Thumbnail

Are Your Employees Your Largest Cybersecurity Risk?

Regardless of the money businesses invest in cybersecurity, technology is only part of the cybersecurity puzzle. Regardless of new hardware, updated software and the best IT support team, cybersecurity is an ongoing commitment. Cybersecurity must be on the minds of every employee every hour of every day. A Chain Is Only As Strong As Its […]

Keep Reading

Blog Thumbnail

Cape Cod Community College Hit With $800,000 Phishing Attack

Hackers Know How to Steal Money Anonymously In West Barnstable, Massachusetts, Cape Cod Community College recently fell victim to a phishing scam that resulted in the school losing more than $800,000. The money was taken out of the school’s bank accounts. While this kind of scam is common these days, there are measures a business […]

Keep Reading

Blog Thumbnail

Is Your Tech Firm Conducting Quarterly Technology Reviews?

No matter the line of business you’re in, outsourcing your IT services to a managed service provider (MSP) provides a world of benefits. Both your internal systems and your online presence will be optimized and streamlined, tech problems will be taken care of right away, and you’ll have more time to focus on what matters. […]

Keep Reading

Blog Thumbnail

A Quick Guide For Buying A New Home Computer

Looking for a new computer for your home office? Year-end sales and tax returns often lead to boosted sales in computers. But purchasing a new computer can feel overwhelming. The technology changes quickly and the jargon can be confusing. Here is an explanation of what you want to consider when looking at getting a new […]

Keep Reading

Blog Thumbnail

How Can You Stay Safe From Phishing Attempts? Try These 7 Tips

In this article, we’ll be going over the top seven ways to protect yourself and your business from email phishing attempts. But first, what is phishing? Phishing Defined Although it may sound like a recreational sport, phishing is not a virtuous practice. It is, instead, the deceitful and illegal practice of trying to obtain personal information […]

Keep Reading

Blog Thumbnail

FTC Issues Warning After Marriott Data Breach

In late 2018, the Federal Trade Commission (FTC) issued a stark warning about a massive data breach at a Marriott chain that exposed the records of 500 million people. The latest major corporate breach reinforces the need for companies to invest in multilayered security protocols that protect networks, devices and users. What Happened at Marriott? […]

Keep Reading

Blog Thumbnail

What Everyone Should Know About Drive Cloning?

Disk cloning involves copying the contents of a hard drive to a replacement hard drive. It includes the file structure and system files and is used for a backup to upgrade, restore or move the drive data. The contents are typically written to one image file, which allows you to do the upgrade or restoration […]

Keep Reading