Call us: (905) 332-5844 or email: info@wwworks.com | Client Login

WWWorks logo

Online Scams: Take Them Seriously

By |2021-07-27T11:29:03-04:00June 28th, 2021|Security|

Although news of large corporate websites being hacked is reported on a regular basis, many small businesses fail to realize that they too, are a possible target for online scams. Even if you’re business is small, don’t move forward with the philosophy that online scams ‘won’t happen to us’. That was the casual attitude of

8 Common Phishing Scams to Avoid

By |2021-07-27T11:29:03-04:00June 28th, 2021|Security|

Online fraud is at all time high. It’s in everyone’s best interest to have a basic understanding of the types of common phishing scams online fraudsters use. Help avoid a cyber crime attack by recognizing the signs. Here are eight types of phishing scams you need to be aware of: 1) Deceptive Phishing Deceptive Phishing

Cyber Security Breaches in Healthcare

By |2021-07-27T11:29:03-04:00June 28th, 2021|Healthcare, Security|

No doubt about it, cyber security breaches are a major concern for everyone, even major websites. Recently a massive denial-of-service (DoS) attack shut down major websites across the internet, including Twitter and Spotify, a streaming music service. The Healthcare industry, in particular, is especially vulnerable to cyber attacks. The Ponemon Institute’s latest study, The Sixth Annual Benchmark Study

Why Managed Compliance is Important for LTC and Retirement Homes

By |2021-07-27T11:29:03-04:00June 28th, 2021|Healthcare, Security|

Do you worry about your Long-Term Care or Retirement home being audited? Do you know if your patient data is secure? What would happen to if your patient data was compromised? Are you unsure of your regulatory compliance with CARP and PIPEDA (“Personal Information Protections and Electronic Documents Act”? Be sure your client or patient data is protected and

Free SSL Certificates with Managed Services

By |2021-07-27T11:29:03-04:00June 28th, 2021|Security|

SSL Certificates are used to establish an encrypted connection between a computer browser and a web server. Secure Sockets Layer’s (SSL) technology activates a lock and the https protocol which allows for secure connections that protects sensitive information. Once that connection is established, all web traffic between the web server and the computer browser will be protected. Usually, an SSL

Get Creative and Change your Common Passwords

By |2021-07-27T11:29:03-04:00June 28th, 2021|Security, Tips & Tricks|

Here’s a reminder to do something you probably haven’t done in a while…change your common passwords.  And, while you’re at it, choose new passwords that are not so common. Some of the most commonly-used passwords, according to the security group SplashData, are “password”, “qwerty”, “12345” and “welcome”.  Predictably, they are all terribly easy to guess. You can see

Outsmart Cyber Criminals to Prevent Identity Theft

By |2021-07-27T11:29:04-04:00June 28th, 2021|Security|

You may have heard it before, but… Prevention is the key to protecting your IT security and identity from cyber criminals. When you read that, don’t you just want to push that thought aside and say, “It won’t happen to me!”. It doesn’t have to be as long as you put preventative measures into place.

Go to Top