Cloud computing provides the convenience small business owners need. It saves time and money, improves collaboration, and boosts productivity. In today’s dynamic business climate, it’s all-important that people get the information they need wherever they happen to be, whether they’re in the office or out and about with their cellular phone. Information travels fast nowadays,
Although news of large corporate websites being hacked is reported on a regular basis, many small businesses fail to realize that they too, are a possible target for online scams. Even if you’re business is small, don’t move forward with the philosophy that online scams ‘won’t happen to us’. That was the casual attitude of
Online fraud is at all time high. It’s in everyone’s best interest to have a basic understanding of the types of common phishing scams online fraudsters use. Help avoid a cyber crime attack by recognizing the signs. Here are eight types of phishing scams you need to be aware of: 1) Deceptive Phishing Deceptive Phishing
No doubt about it, cyber security breaches are a major concern for everyone, even major websites. Recently a massive denial-of-service (DoS) attack shut down major websites across the internet, including Twitter and Spotify, a streaming music service. The Healthcare industry, in particular, is especially vulnerable to cyber attacks. The Ponemon Institute’s latest study, The Sixth Annual Benchmark Study
Do you worry about your Long-Term Care or Retirement home being audited? Do you know if your patient data is secure? What would happen to if your patient data was compromised? Are you unsure of your regulatory compliance with CARP and PIPEDA (“Personal Information Protections and Electronic Documents Act”? Be sure your client or patient data is protected and
SSL Certificates are used to establish an encrypted connection between a computer browser and a web server. Secure Sockets Layer’s (SSL) technology activates a lock and the https protocol which allows for secure connections that protects sensitive information. Once that connection is established, all web traffic between the web server and the computer browser will be protected. Usually, an SSL
Here’s a reminder to do something you probably haven’t done in a while…change your common passwords. And, while you’re at it, choose new passwords that are not so common. Some of the most commonly-used passwords, according to the security group SplashData, are “password”, “qwerty”, “12345” and “welcome”. Predictably, they are all terribly easy to guess. You can see
You may have heard it before, but… Prevention is the key to protecting your IT security and identity from cyber criminals. When you read that, don’t you just want to push that thought aside and say, “It won’t happen to me!”. It doesn’t have to be as long as you put preventative measures into place.