Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because "calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer." Is your name and your phone number all it takes for a hacker to take over your cellphone account? ... Read More
- Published: 02 Feb 2018
Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Ontario small businesses that only do business locally are at risk of these issues. Personal email accounts
- Published: 01 Feb 2018
Sometimes when your workstation feels bogged down, a relatively cheap and simple hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.
- Published: 30 Dec 2017
Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let’s talk about a few of these statistics and what it means.
- Published: 28 Dec 2017
When you mention the term ‘disaster recovery,’ most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute a disaster for your business, and they aren’t seasonal.