Uncategorized

Ransomware emails: How to identify

Ransomware emails: How to identify and steer clear of them Ransomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs, shipping giants, etc., have all been victims of ransomware attacks. Your business could be too!…

How good is your password

How good is your password? Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related to passwords that you can follow to ensure passwords are…

Think you are too small

Think you are too small to be targeted by a cybercriminal? Think again. When I meet with clients, especially SMBs, I often hear them say that they feel their business is too insignificant to be a target of cyber-criminals. Why…

Keeping your data safe: Access Control

Keeping your data safe: Access Control Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your data or hold it hostage, but also inflict irreversible damage on your brand and business. As…