Selected Tag: best practices

Total posts: 15

How to Use the CIS Controls Framework for Your Business

How to Use the CIS Controls Framework for Your Business

Posted on January 15, 2020 - by Justin Gratto

For businesses, leveraging a framework like CIS Controls makes sure your company and customer data stay safe. You want to use trusted security and privacy frameworks for your business and ...

Read More
6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

Posted on December 4, 2019 - by Laird Wilton

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
How to Make Your Team Care About Cyber Security

How to Make Your Team Care About Cyber Security

Posted on March 23, 2018 - by Darryl MacLeod

Whether they know it or not, employees are on the frontline of the defence against cyber attacks. The mindset of “it won’t happen to us”, when it comes to ...

Read More
Best Practices for Printer Security

Best Practices for Printer Security

Posted on March 15, 2018 - by Darryl MacLeod

Printer security is an easy topic to overlook in your information security program. But don't make that mistake at your company. The printers in your office can be an easy ...

Read More
How to Setup a Password Protected Screensaver in macOS

How to Setup a Password Protected Screensaver in macOS

Posted on March 8, 2018 - by Darryl MacLeod

Protecting your Mac’s screensaver with a password is simple. Yet many users don’t think about doing it. If you’re a Windows user, don’t worry, we have ...

Read More
Employees, You Are The Weakest Link

Employees, You Are The Weakest Link

Posted on March 6, 2018 - by Darryl MacLeod

When an employee signs a policy they acknowledge they have read and understand the document but is that really the case? Turns out, the answer is no. A ...

Read More
Strong Passwords and 4 Types of Passwords You Should NEVER Use

Strong Passwords and 4 Types of Passwords You Should NEVER Use

Posted on March 1, 2018 - by Darryl MacLeod

Strong passwords are a good defense against persistent cyber attackers but weak passwords can be the entryway to confidential data and operating systems. While there are so many types of ...

Read More
How to Disable Automatic Login in macOS

How to Disable Automatic Login in macOS

Posted on February 16, 2018 - by Darryl MacLeod

Automatic login can be either a useful feature for devices in the workplace... or a vulnerability in your security program. When you set up a new Mac, or do a ...

Read More
7 Steps to Protect Your Personally Identifiable Information

7 Steps to Protect Your Personally Identifiable Information

Posted on October 6, 2017 - by Darryl MacLeod

In light of the Equifax data breach, it is extremely important for organizations to protect their personally identifiable information (PII). Governments are ramping up regulations and fines (see our&...

Read More
How to Recover From a Data Breach

How to Recover From a Data Breach

Posted on September 11, 2017 - by Darryl MacLeod

Considering that a data breach can happen to any company, at any time, being proactive is often the best tactic. If you suspect that you are a victim ...

Read More
Don’t Keep Your Head In The Cloud: 5 Ways To Secure Your Local Data Backups

Don’t Keep Your Head In The Cloud: 5 Ways To Secure Your Local Data Backups

Posted on August 14, 2017 - by Darryl MacLeod

Local data backups are still an essential element of an effective security program for many organizations, even in the age of Amazon Web Services, Google Cloud, and Microsoft ...

Read More
Email Security: A Phishing Tale

Email Security: A Phishing Tale

Posted on July 5, 2017 - by Darryl MacLeod

Email phishing is tricky - it often comes from a sender you already know and trust. A few weeks ago my wife told me that she got an unexpected email ...

Read More
4 Things You Can Do Today to Protect Yourself from Ransomware Attacks

4 Things You Can Do Today to Protect Yourself from Ransomware Attacks

Posted on June 28, 2017 - by Darryl MacLeod

With attacks like Petya and WannaCry, ransomware has reared its ugly head again. While a recent threat primarily targeted Windows systems, you should still be vigilant when it comes ...

Read More
Cybersecurity Policies: A Cheat Sheet [with Templates]

Cybersecurity Policies: A Cheat Sheet [with Templates]

Posted on June 8, 2017 - by Darryl MacLeod

Cybersecurity policies are necessary for all technology businesses at this point. Your company must have information security policies in place and demonstrate that you are following them. The trouble is ...

Read More
5 Things to Secure Your Company Against Cyber Threats

5 Things to Secure Your Company Against Cyber Threats

Posted on February 24, 2017 - by Laird Wilton

Cyber threats are a serious business concern. Businesses and not-for-profit organizations are processing and storing larger and larger quantities of information about clients, members, employees, and partners. Much of it ...

Read More