Blog

Keeping bad guys out

In our previous blog post, we talked about how to protect your organization by keeping your company’s organization chart private. We encouraged you to adopt a policy to keep details off your website and off social media, including LinkedIn. In this post on security, we’re going to look at how to keep bad actors out of your facility by focusing on physical security.

Physical security in a digital age

Does your company issue ID cards to employees? Chances are you do. […]

Read more...

Helping hackers or why you shouldn’t publish your organization chart

Organizations love to share information about themselves. Accomplishments, awards, and including who works there – especially high profile employees like executives, vice presidents, senior managers, and occasionally team members. Did you know by publishing information on your corporate website, you’re making it easier to attack your business? In this article, we will show how you increase your attack surface by making it easier for hackers to impersonate key employees.
Hacking the company… with help
When hackers look to attack a company, […]

Read more...

Bleeding Bit: Two Bluetooth Chip Flaws in Cisco and Meraki Devices

Two flaws in Bluetooth chips open millions of devices to attack
Security researchers detailed a pair of critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in global access points and networking devices.
The Hacker News fills in the details: “Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including medical devices such as insulin pumps and pacemakers, as well as point-of-sales and IoT devices.
“Discovered by […]

Read more...

How Office 365 helps small business save money

When we talk to small business owners about the cloud, a few major concerns rise up: How secure is my data? How does this increase my costs? In this post, we’re going to explore how Office 365 can actually help your small business save money.
The true cost of cloud
When it comes to Microsoft products, there’s a lot of costs involved. A lot. It’s really not an exhaderation on our part either because we have taken Microsoft Licensing classes and […]

Read more...

Windows 10 Extended Support for Business

Microsoft recently announced a new support schedule for Windows 10. This schedule changes how long patches are made available to “the last Windows version”. One of the major complaints by businesses is that a new Windows version comes way too fast. They don’t have ways to properly implement and deploy the new version just before it becomes unsupported. Microsoft has assured us that this practice is changing.
Beat to a new drum
In the past, each Windows 10 release had support […]

Read more...

KRACK: Your wireless network is at risk!

The other day a massive vulnerability was discovered in WPA2 wireless encryption which secures just about every wireless network – from the one in homes, to your office, to even your favourite coffee shop where you have to ask the barista for the daily wifi password. Every OS – Windows, macOS, Linux, Apple iOS, Android – are all susceptible to this attack.

This attack is called KRACK which stands for Key Reinstallation Attack. This attack can be used to read data transmitted between […]

Read more...

The Changing Face of Cybercrime – Know Your Enemy

As a cybersecurity professional, you are the guardian of data, the gate keeper, and the architect of defense. You live on the front lines of a digital battle against invisible enemies and advanced persistent threats.
It’s your job is to find and protect any possible vulnerability or weakness that could be exploited anywhere in your organization at any time—24/7/365.
Your enemy’s job is to find one weakness. Just one!
Your enemy will exploit your infrastructure, your people, and anyone connected to you […]

Read more...

Work smarter with Windows 10 and virtual desktop

Windows 10 is without a doubt one of the most popular operating systems released by Microsoft. Did you know that Microsoft made it even easier to multitask in this already powerful operating system? We’re going to take a look at virtual desktops, one of the most long awaited features of Windows and something that operating systems like Linux® and macOS® have had for years.
Multitask with Task View
There’s an icon many people overlook when they use their desktop. It’s right […]

Read more...

Going Virtual: The Security Considerations of Public vs. Private Cloud

Cloud computing can bring significant benefits to your IT operation, but it can also carry some security risks, so organizations need to understand how they can take advantage of all it has to offer without putting their data at risk. This article describes how to develop a cloud-based computing strategy that mixes scalability with security.
Two main factors that attract companies to the cloud: the first is its potential for cost efficiency. Eliminating the capital expenditure on local servers can […]

Read more...

VMware vs Hyper-V—Which Virtual Infrastructure Should You Choose

VMware vSphere® and Microsoft® Hyper-V® are both enterprise-class hypervisors, and the question of which hypervisor is better has been hotly debated over the past several years. Asking someone which hypervisor is better is a lot like asking someone whether a PC or Mac® computer is better. The answer is likely to be based on personal biases, when in reality, both PCs and Mac computers are very capable. The same is largely true of vSphere® and Hyper-V. Both are excellent […]

Read more...