Updating Your Security Policies

6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

Posted on December 4, 2019 - by Laird Wilton

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
How to Encrypt a Hard Drive with BitLocker in Windows 10

How to Encrypt a Hard Drive with BitLocker in Windows 10

Posted on September 18, 2019 - by Darryl MacLeod

Encryption is key to making sure that your data is protected. It's also an easy best practice to include in your security policies. The encryption process can vary between systems ...

Read More
What NOT to Say During a Security Audit of Your Startup

What NOT to Say During a Security Audit of Your Startup

Posted on September 16, 2019 - by Darren Gallop

Founders and CTOs often say or do terrible things in security audits. Over the last three years, I have personally played a role in over 100 vendor security audits as both ...

Read More
How to Disable Automatic Login in Windows 10

How to Disable Automatic Login in Windows 10

Posted on September 15, 2019 - by Darryl MacLeod

When you first set up a new PC with Windows 10, you create a user account which is set by default to log in automatically at startup. This likely isn’t ...

Read More
Why Every Company Needs a Disaster Recovery Policy

Why Every Company Needs a Disaster Recovery Policy

Posted on July 10, 2019 - by Darren Gallop

If a company relies on computers, it is highly likely that an IT failure would have a negative impact on the business - and make you wish you had a ...

Read More
But First, Security Policies and Procedures

But First, Security Policies and Procedures

Posted on July 5, 2019 - by Russell Radzikowski

I’ve seen first-hand what happens when companies fail to fully implement information security policies and procedures. It's hard to do it properly on your own. That's why as the ...

Read More
Top Security Trends for 2019

Top Security Trends for 2019

Posted on July 2, 2019 - by Darren Gallop

Now that we’re halfway through 2019, let’s take a look at our top five security trends for the year 2019. Some of these might seem obvious to you, which means ...

Read More
7 Tips for Office LAN Security

7 Tips for Office LAN Security

Posted on June 14, 2019 - by Darren Gallop

Office network security is the local area network (LAN) in the workspace or office. Security of this network is a top priority. It doesn't matter how big your company is ...

Read More
Working from Home? Here’s Our Security Tips for Remote Work

Working from Home? Here’s Our Security Tips for Remote Work

Posted on March 9, 2020 - by Russell Radzikowski

More companies than ever are offering the option of working from home — or even requiring it, in an effort to keep their workforce healthy in the face of the spreading ...

Read More
How to Protect Yourself When You Travel & Security Tips

How to Protect Yourself When You Travel & Security Tips

Posted on March 26, 2019 - by Darren Gallop

Travel security isn't always the first thing on your mind when you're planning a business trip. But security is always a top priority when I'm working remotely and traveling. Not ...

Read More
How to Enable Auto-Updates in Windows 10

How to Enable Auto-Updates in Windows 10

Posted on February 7, 2019 - by Darryl MacLeod

Updates in Windows 10 are critical for keeping your systems secured. Cybersecurity specialists send alerts and reminders to businesses and government agencies on a regular basis about installing updates. A flaw ...

Read More
6 Reasons to Update Your Security Policies Right Now

6 Reasons to Update Your Security Policies Right Now

Posted on September 20, 2018 - by Shannon McFarland

With frequent data breaches in the news and regulators hammering down on security and privacy issues, many executives and technical leaders are updating their policies and procedures.  We recently ...

Read More
Protect Your Business During Tax Season

Protect Your Business During Tax Season

Posted on February 27, 2018 - by Colin MacInnis

Between Winter and Spring there is another season that brings its own highs and lows: tax season. This is when hackers think that businesses are at their most vulnerable. These ...

Read More
What is the “Internet of Things (IoT)?”

What is the “Internet of Things (IoT)?”

Posted on February 23, 2018 - by Colin MacInnis

Living in the 21st Century, we are surrounded by the “Internet of Things.” From the moment we wake up and brew a pot of coffee to when we set the ...

Read More
How to Disable Automatic Login in macOS

How to Disable Automatic Login in macOS

Posted on February 16, 2018 - by Darryl MacLeod

Automatic login can be either a useful feature for devices in the workplace... or a vulnerability in your security program. When you set up a new Mac, or do a ...

Read More
How to Turn on The Firewall in macOS

How to Turn on The Firewall in macOS

Posted on February 15, 2018 - by Darryl MacLeod

MacOS includes an easy-to-use firewall that can prevent potentially harmful incoming connections from other computers. To turn it on or off: From the Apple menu, select System Preferences.When the ...

Read More
How To Turn on The Firewall in Windows 10

How To Turn on The Firewall in Windows 10

Posted on February 15, 2018 - by Darryl MacLeod

You might be required to enable the Windows Firewall by your job. Or disable it to use alternative software based on your company's security policies. In Microsoft Windows 8 and 10, you ...

Read More
How to Backup Your Mac

How to Backup Your Mac

Posted on February 14, 2018 - by Darryl MacLeod

MacOS has a built-in backup tool called Time Machine. Once you plug in a hard drive and set up Time Machine, it will work automatically in the background, continuously ...

Read More
How to Disable Remote Access in Windows 10

How to Disable Remote Access in Windows 10

Posted on February 14, 2018 - by Darryl MacLeod

Remote access effectively allows you to control everything on your computer as if you were directly connected to it. In Windows 10, you can do this through the Windows Remote Desktop ...

Read More
How to Disable Remote Access for macOS

How to Disable Remote Access for macOS

Posted on February 14, 2018 - by Darryl MacLeod

Remote Access is a useful feature of macOS that lets you access files on your computer from anywhere.However, remote access also lets anyone with your administrator login and password ...

Read More
How to Encrypt a Hard Drive in macOS

How to Encrypt a Hard Drive in macOS

Posted on February 13, 2018 - by Darryl MacLeod

We know that encryption is important for the protection of your data. And there's no excuse since your Apple computer comes with tools to encrypt a hard drive in macOS. ...

Read More
How to Set Up File Backups in Windows 10

How to Set Up File Backups in Windows 10

Posted on February 13, 2018 - by Darryl MacLeod

Routine file backups are an essential way to protect against losing any important data on your hard-drive. Windows 10 comes with tools and features that make backing up your data easy. ...

Read More
How to Check for Viruses Using Built-In Tools in Windows 10

How to Check for Viruses Using Built-In Tools in Windows 10

Posted on February 9, 2018 - by Darryl MacLeod

A Windows 10 virus can infect enough computers to make news headlines, taking down operations for big businesses or even government agencies. Windows 10 is now the most popular operating system in ...

Read More
How to Check for Viruses Using Built-In Tools in macOS

How to Check for Viruses Using Built-In Tools in macOS

Posted on February 8, 2018 - by Darryl MacLeod

It's important to routinely check your computer for viruses. You may have been led to believe that you don’t have to worry about computer viruses on your Mac. And, ...

Read More
How to Enable Auto-Updates in macOS

How to Enable Auto-Updates in macOS

Posted on February 6, 2018 - by Darryl MacLeod

Apple makes it easy to enable auto-updates for your macOS. It all happens in the background while you’re going about your day. Apple will never install an update without ...

Read More
How to Use a Password Manager

How to Use a Password Manager

Posted on February 5, 2018 - by Darryl MacLeod

Password managers are great. We all know the struggles of staring at the computer screen trying to remember the password to a login. Thankfully, password management tools exist to save ...

Read More
Securicy Policy Builder Launches in TechStars Boston Accelerator Program

Securicy Policy Builder Launches in TechStars Boston Accelerator Program

Posted on February 1, 2018 - by Darren Gallop

Securicy, a Cape Breton, Nova Scotia and Boston, Massachusetts-based provider of end-to-end cybersecurity tools and resources for small and mid-sized business,  announces today the launch of Policy Builder, ...

Read More
4 Ways Startups Can Protect Network Security: A Risk-Based Approach

4 Ways Startups Can Protect Network Security: A Risk-Based Approach

Posted on December 1, 2017 - by Darryl MacLeod

You have a great idea for a startup. So you come up with a solid business plan. You pitch it over and over and over. You get funding. Everything is ...

Read More
7 Steps to Protect Your Personally Identifiable Information

7 Steps to Protect Your Personally Identifiable Information

Posted on October 6, 2017 - by Darryl MacLeod

In light of the Equifax data breach, it is extremely important for organizations to protect their personally identifiable information (PII). Governments are ramping up regulations and fines (see our&...

Read More
Why North American Companies Should Care About GDPR

Why North American Companies Should Care About GDPR

Posted on September 21, 2017 - by Darryl MacLeod

GDPR isn't just for tech companies in the European Union. As a measure to improve the levels of protection of European Union citizens' data, the European Parliament adopted the General ...

Read More
How to Recover From a Data Breach

How to Recover From a Data Breach

Posted on September 11, 2017 - by Darryl MacLeod

Considering that a data breach can happen to any company, at any time, being proactive is often the best tactic. If you suspect that you are a victim ...

Read More
Don’t Keep Your Head In The Cloud: 5 Ways To Secure Your Local Data Backups

Don’t Keep Your Head In The Cloud: 5 Ways To Secure Your Local Data Backups

Posted on August 14, 2017 - by Darryl MacLeod

Local data backups are still an essential element of an effective security program for many organizations, even in the age of Amazon Web Services, Google Cloud, and Microsoft ...

Read More
Email Security: A Phishing Tale

Email Security: A Phishing Tale

Posted on July 5, 2017 - by Darryl MacLeod

Email phishing is tricky - it often comes from a sender you already know and trust. A few weeks ago my wife told me that she got an unexpected email ...

Read More
4 Things You Can Do Today to Protect Yourself from Ransomware Attacks

4 Things You Can Do Today to Protect Yourself from Ransomware Attacks

Posted on June 28, 2017 - by Darryl MacLeod

With attacks like Petya and WannaCry, ransomware has reared its ugly head again. While a recent threat primarily targeted Windows systems, you should still be vigilant when it comes ...

Read More
Cybersecurity Policies: A Cheat Sheet [with Templates]

Cybersecurity Policies: A Cheat Sheet [with Templates]

Posted on June 8, 2017 - by Darryl MacLeod

Cybersecurity policies are necessary for all technology businesses at this point. Your company must have information security policies in place and demonstrate that you are following them. The trouble is ...

Read More
5 Things to Secure Your Company Against Cyber Threats

5 Things to Secure Your Company Against Cyber Threats

Posted on February 24, 2017 - by Laird Wilton

Cyber threats are a serious business concern. Businesses and not-for-profit organizations are processing and storing larger and larger quantities of information about clients, members, employees, and partners. Much of it ...

Read More