What you need to know about juice jacking

We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this […]

Time to upgrade Windows 7 to Windows 10

The clock is ticking. As of January 2020 Windows 7 will no longer be supported by Microsoft. Software updates such as critical security improvements will stop. Leaving the software vulnerable to cyber security attacks.

Still wondering if you should upgrade to Windows 10? Microsoft's latest operating system is a solid product, with significant improvements under the hood that have made it the most secure and productive Windows operating system ever.

Why should you explore IT managed services for your Toronto small business

Running your own in-house IT support staff can be prohibitively expensive for small business. And not having a partner can lead to unexpected surprises or costly downtime. However, a managed IT services provider in Toronto can lighten the IT budget burden with a more fixed cost approach to managing your IT support needs.

Some ransomware strains are free to decrypt

Over the last few years, different versions of ransomware have sprung up, all aimed at extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is if there’s a free cure for the ransomware that infected your systems. The state of ransomware […]

Cyber Security Stats That Matter and What You Need to Do

We’re always answering client questions about cyber security. And we’re happy to do it. The threat to small business is growing each day. That’s why we put together these cyber security stats that matter.

For example, it’s a big mistake to think you’re a small business and not a target.

Protecting your Facebook and Twitter from hackers

The Facebook worldwide privacy scandal should have been a wake up call for all of us to revisit our social media privacy settings. We should be vigilant in keeping our personal information safe. Here are tips to keep your Facebook and Twitter accounts well-secured. Lock screens exist for a reason Lock all your computing devices […]

Protect your network from watering hole attacks

With evil elements continuously developing novel ways to infiltrate networks and steal user data, it is more crucial than ever to stay one step ahead of the curve. Protect yourself from cybercriminals by learning more about their methods. Here are some tips to deal with the threat of watering hole attacks: What are watering hole […]

A new kind of attack: Distributed spam distraction

Every day, you receive dozens of email messages, including spam, which is usually harmless, unless there’s a malware attached to it. But even the harmless ones can become more than just an annoyance if you have thousands of them flooding your inbox. Learn how a new spam attack called distributed spam distraction can do more […]

Simple ways to protect your email account

Everyone uses email as the central hub for their personal internet activities, but this also makes it an attractive target for cyberattacks. The importance of email security is vital to your company’s survival, so applying these simple tips can dramatically reduce your exposure to hackers and malware. Use separate email accounts Most people use a […]