Cyber Security Guidance

Cyber Security Guidance

We’re here to help you determine how confident you can be that a cloud service is secure enough to handle your data. It will help you evaluate the security of any cloud service and is built around 8 Security Principles. Fair warning, the extent of your security...
PSSST… Are You Protected Against Leakware?

PSSST… Are You Protected Against Leakware?

​You’ve heard about ransomware by now. Cybercriminals access and encrypt your data. You have to pay a “ransom” for the key to unlock it. Leakware is similar, but now the bad actors are threatening to post confidential information online if you don’t pay up. When you...
Don’t Get Hooked By a Whaling Attack

Don’t Get Hooked By a Whaling Attack

The executives of your company are the big fish in your sea. Yet cyber criminals think of them as whales. In fact, whaling is a new cyber security threat targeting the C-suite level. You’ve likely heard of phishing attacks. Phishers use scam emails or spoofed websites...
Are You Doing Your IT Due Diligence?

Are You Doing Your IT Due Diligence?

The words “due diligence” may make you think of a courtroom drama on television. Surely, that’s something only lawyers have to worry about? Not so fast. Due diligence is something your business can be doing, too. Are you covering the basics? Due diligence is about...
Security Patches — The Better Way to Update

Security Patches — The Better Way to Update

Updates often come at the worst moment. You go to shut down your laptop to rush to a meeting, and you get a “Windows is updating. Do not power off” message. Argh! Or you leave your desktop to go to a meeting and come back to find your computer has restarted in your...