Posts by John Mamon
Cyber Threats – The Types of Attack
In our previous article we explored why your small business may be a prime target for cyber threats. In this article, we’ll go over the type of threats your business could face if unprotected. The Most Common Types of Cyber Threats Malware Malware is software that is designed specifically to cause problems, and is used…
Read MoreCyber Threats – Are You a Target?
The number one threat to businesses is cyber crime. Today, your business is far more likely to be targeted by a cybercriminal than a traditional intruder. And if you’re a small business, even just a ma and pa shop, do not assume you are under the radar. If you have a computer network, if you…
Read MoreThe Importance of a Good Website for Your Business
Whether you sell your product or service online or not, a good web presence is no longer a nice to have, but an absolute necessity. Whether it’s a customer trying to find how to contact you, a prospective customer looking to scrutinize your offering, or a potential partnership opportunity exploring how you might work together,…
Read MoreProtect Your Documents with Sensitivity Labelling
What is a sensitivity label? A sensitivity label applied to a 365 document is a tag that can give you controls over the security of that document, both when creating and saving it, and when emailing it. Sensitivity labels allow you to protect your sensitive business content from cyber threats. The benefits of sensitivity labels…
Read MoreEmbrace Workspaces
Embrace Workspaces – a cloud virtual desktop service – improves your security, makes backups automatic and reliable, and keeps you in compliance if your business has specific regulations. It’s ideal for remote or work-from-home employees as they can work from your systems and share information from anywhere. With more of your workforce being remote, this…
Read MoreSecurity Assessments – Penetration Testing
What is Penetration Testing? A penetration test – aka ethical hacking – is an authorized simulated cyber attack on a computer system. As with anything else security related, a test is necessary – that is why safe doors are assessed by a professional safe cracker before being installed in a bank. Our penetration testing identifies the…
Read MoreHow to Gain Efficiency from Your Remote Workforce
If your business survived Covid by transitioning to a remote workforce – fantastic! Now that the worst of the pandemic seems to be behind us, coping can no long be the objective. It’s time to thrive again. You have no doubt seen multiple benefits from having a full or partial remote workforce, and employees may…
Read MoreWhere to Start as a Technology Beginner
The world is changing at a truly alarming rate and some of us feel left behind, scrambling to keep up with whatever technology businesses are using now. While you’re focusing on the business of your business, it’s easy to forget to stay current with the technology that would improve your processes. It’s not too late…
Read MoreHow to Use Microsoft Teams: A Beginner’s Guide
Microsoft Teams has rapidly become one of the most popular applications of its kind, but some of us are only just discovering its true value – so, let’s explore Teams in detail and find out what it can do for your business. What does Teams do? Teams makes it possible to use many of the…
Read MoreThe Dark Web – A Guide to Stopping Your Data Ending up There
The likelihood of your organization becoming a victim of cyber crime has risen considerably over recent years. It our responsibility as business owners to educate ourselves on the threats that a successful cyber attack can pose on our organization. We must know the cyber security measures on the market, and understand what attacks they combat,…
Read More