The internet is a wonderful tool for productively connecting and communicating with others, but it can also be dangerous – and distracting. A business-class router can certainly provide protection, but it’s not always enough, and doesn’t offer the enhanced security and filtering that other solutions do.Details
I’m a privileged citizen of an incredible country: Canada. I’m naturalized, and like most who are not born here, we have a deeply emotional attachment to our citizenship. We are the most fortunate people on earth! This may sound odd, but my good-night songs to my children is “Oh Canada” (our national anthem). One of…Details
Yesterday afternoon, SpamHaus, the well known email blacklist provider, blocked a large block of IP addresses belonging to Amazon cloud services. Our shared email service uses an IP address that fell within this block of IPs owned by Amazon, and thus affected our clients. (Thankfully, it was a holiday in North America, so the effects…Details
Businesses large and small have to manage risk. They invest in measures to prevent risk, including fire sprinklers, alarm systems, security cameras, employee training, and insurance.
What is the single biggest risk businesses face? Fire – no. Break-ins, shoplifting, or other traditional crimes – no. Floods or other natural disasters – no.
For the past two years, the biggest risk faced by businesses is……..
Many keyboard shortcuts come built into Windows. Some are gimicky, like the “Aero” view in Windows 7 that shows a real-time view of open programs and allows you to quickly flip between them (Alt+Tab). Other key combinations are more practical, allowing you to quickly “lock” your computer from unwanted access, or easily zoom in for a better view of a webpage.Details
Think worms are the malware of yesteryear? Not so. A new worm has been spreading rapidly. This worm spreads via RDP (remote desktop connection).
This worm does not seem to be exploiting any new vulnerabilities in the RDP protocol. Rather, it gets its foothold in the internal network through other means, such as Adobe flash or Reader vulnerabilities or general phishing attacks.
Thou shall use e-mail to convey only ideas and factual or logistical information, not emotions. To express emotions and sentiment, take time for a one-on-one meeting or telephone conversation rather than sending an e-mail. The sound, tone, timber, and quality of your voice will help to better communicate your message and avoid misunderstandings.Details
If you are using Outlook (any version), and you have managed to reset the security level for e-mails, There are two things you need to do to help prevent malicious emails from affecting your computer. The first step is to turn the ‘Reading Pane’ ‘Off’, then turn the ‘Auto-Preview’ on, which will only displays the first three lines of the message, which should be enough to tell if the email is safe to read or simply junk.Details
Are you concerned about identity theft? They should be. Most of us are.
Half of all identity theft occurs in the workplace. Think about it. Your employer has your name, address, phone number, Social Security / Social Insurance / National Identification number, and more personal information on file. Few SMEs have tight security internally.