Cybersecurity Awareness Month: Why Two Factor Authentication (2FA) is Important

Two-factor authentication (2FA) is an easy way to add a layer of security to any login credentials.

The "two" in the name refers to the fact that apart from something you know (your password), a valid login requires a 2nd factor, something you have, which could be an app, your mobile phone, your fingerprint, or even your face.

How to keep your email account safe

Many businesses use email to send and receive sensitive information, making it an attractive target for cyberattacks. To reduce your exposure to cyberthreats, implement the following email security measures. Use separate email accounts Most people use a single email account for all their online tasks. As a result, all information from websites, newsletters, shopping deals, […]

Cybersecurity Awareness Month: Creating Secure Passwords

Strong passwords or passphrases are critical to ensure the safety of all online account log-ins.  In the spirit of Cybersecurity Awareness Month, here are some tips to ensure your passwords pass the test:

They should be at least 8 characters long
Composed of three of these character classes:

Lower-case letters: (abcde . . . . )
Upper-case letters (ABCDE . . . .)
Numbers (123456 . . . )
Non-alphanumerics (?><{:")*&^ . . . .)

Passwords should be unique for every log-in.

What is single sign-on and what are its benefits?

Secure logins are a necessity in business, but managing so many user credentials can get tedious. The good news is that you can simplify your organization’s login processes without compromising security by deploying single sign-on. What is single sign-on (SSO)? Single sign-on allows you to use one username and one password to provide secure access […]

Here’s what to remember when buying antivirus software

It’s essential to have antivirus software installed on your business computers to protect these against viruses, malware, ransomware, and spyware, among others. However, not all antivirus programs are created equal. If you’re looking for the best antivirus software, consider the following points. Cost There are free antivirus programs in the market, but they only offer […]

Secure your Mac before discarding it

Well over half of Americans save account passwords to an application or web browser, and at least as many also store private documents on their computers. That’s fine for people who take active measures to protect their data, but if you give away a computer, you surrender all control over it. That’s why you need […]

Cybersecurity Resources for Work and Home 

The Cybersecurity & Infrastructure Security Agency (CISA) is a Department of Homeland Security (DHS) federal government agency with the mission to increase national cyber resilience to protect critical services and national interests.   

Their website that has some great resources not only for small-to-medium sized businesses, but for everyone that connects to the internet, whether at work or at home.

Tips to keep your business data safe

Losing or compromising data can be disastrous for your business. It can lead to reputational damage, costly lawsuits, and termination of contracts, among others. And because threats to data security are always present online, it’s important to implement tough security measures that will keep your business data safe 24/7. Here are some tried-and-tested methods to […]

How to create a strong passphrase

It’s not controversial to state that good, secure passwords are hard to create and even harder to remember.

And there are few things more frustrating than having to create a new password because you forgot the old one or were forced to change it.

In our attempt to make passwords easier to remember, we start adopting bad password habits.

The hows of watering hole attack prevention

There are millions of malware in existence, with new ones being developed by the minute. This is terrible news for anyone who stores personal information online — which is basically everyone in the world today. Learn how you can avoid being a victim of a watering hole attack, one of the most common ways cybercriminals […]

It’s time to take downtime seriously. Discover why an MSP is your best ally against this threat. Download our free eBook today to learn more!Download here
+