Blog
Cybersecurity terminology you need to know
Do IT security terms like “phishing” and “intrusion protection” sound extremely foreign to you? If so, it’s time you familiarize yourself with these and other
Keep your Microsoft 365 environment secure with these tips
Microsoft 365 is one of the most widely used business productivity suites today. From email and collaboration to cloud storage and enterprise content management, the
Struck by ransomware? Try out these decryptors to recover your data
There are several ransomware decryptors now, thanks to communities of white hat hackers concerned about increasing ransomware attacks worldwide. While some of these decryptors do
SCAM ALERT: phishing scam uses Microsoft as lure
A recent scam led to at least one person being defrauded of more than $9,000USD in Canada. The crime was reported to police on Mar
Your business’s cybersecurity needs an MSP
With the prevalence of cyberattacks on companies of all sizes these days, businesses cannot afford to relegate cybersecurity to the bottom of their budget priorities.
Fileless malware: Are you at risk?
Over the past few years, the security industry has witnessed a rapid evolution in attack techniques, including fileless malware. Now, cybercriminals use legitimate tools and
Researchers uncover new strain of Android malware
The Android operating system (OS) relies on an open-source code that allows users and manufacturers to modify their phones’ or tablets’ OSs. The problem is,
Some ransomware strains are free to decrypt
Over the last few years, different versions of ransomware have sprung up, all aimed at extorting money from your business. Before you even consider paying
Solve these Office 365 security challenges
Microsoft’s Office 365 is a robust productivity and collaboration tool. Businesses are particularly drawn to its advanced features, flexibility, and cost-efficiency. But like other cloud-based
IT terms you need to know
Jargon can be intimidating if you’re dealing with IT issues and you’re anything but techy. Running an anti-malware scan can generate auto pop-ups that leave