Blog
People get phished, give their card numbers or credentials to fraudsters, then demand that the banks refund them the money they lost. But...what about personal responsibility?
Intune provides powerful policies to protect endpoints from evil hackers.
A strange case, indeed; accenting the "strange" part...
33 years in the IT business, and I only have one regret.
And just like that, all my OneDrive files were gone. No warning, just Poof!! All gone...
Now the hunt was on for a replacement.
94% of malware is delivered via email (Verizon DBIR 2019). There's a better way to share sensitive files and messages.
Password-stealing malware is still an attractive target for cyber-badguys; the last 6 months have seen a 45% rise in targets. But why work so hard? Just ask everybody on Facebook what the colour of their first car was, or what…
Cybersecurity news from the past week
What is Cybersecurity Posture and How to Improve ItFind our what cybersecurity posture isVideo version of this article belowHead to v2cloud.com and fill out the Cybersecurity GraderBefore we begin discussing such things, we must begin by defining some words; words,…
When it comes to cybersecurity, the more layers we can add to our defence strategy, the more we can mitigate the risk of a cyberattack. This is why I recommend CIRA's DNS Firewall.About CIRAThe Canadian Internet Registration Authority (CIRA) is…
(Note: referenced media articles are local to Quebec, therefore in French) "I have good backups, so we're well protected." No. Sorry, but no. Talk to Mr. Marquis of Marquis Equipment in Sherbrooke; last November, his company was robbed of $120,000.00.…
We lock our house doors when we leave. We lock our car doors when we park. We lock up our businesses when we close. Why? Simply, because we want to protect what’s ours; we want to make sure that no…