Cyber Threats – The Types of Attack 

Cyber Threats the types of attack

In our previous article we explored why your small business may be a prime target for cyber threats. In this article, we’ll go over the type of threats your business could face if unprotected. The Most Common Types of Cyber Threats  Malware  Malware is software that is designed specifically to cause problems, and is used…

Read More

Protect Your Documents with Sensitivity Labelling

protect your documents with sensitivity labelling

What is a sensitivity label? A sensitivity label applied to a 365 document is a tag that can give you controls over the security of that document, both when creating and saving it, and when emailing it. Sensitivity labels allow you to protect your sensitive business content from cyber threats. The benefits of sensitivity labels…

Read More

Security Assessments – Penetration Testing

security assessments penetration testing

What is Penetration Testing? A penetration test – aka ethical hacking – is an authorized simulated cyber attack on a computer system. As with anything else security related, a test is necessary – that is why safe doors are assessed by a professional safe cracker before being installed in a bank.  Our penetration testing identifies the…

Read More

The Dark Web – A Guide to Stopping Your Data Ending up There

The likelihood of your organization becoming a victim of cyber crime has risen considerably over recent years. It our responsibility as business owners to educate ourselves on the threats that a successful cyber attack can pose on our organization. We must know the cyber security measures on the market, and understand what attacks they combat,…

Read More

Outdated Technology in Small Businesses

Outdated computers in cluttered office

Most small businesses don’t invest enough in technology, or at the very least they don’t do it often enough. For some this is due to apprehension about spending money on tools they know very little about, and some have the approach of ‘so what, it still works so I don’t care’. Both are fair points…

Read More

How to Protect against Phishing email scams

credit card held up to computer monitor for phishing scam

Phishing scams are one of the most popular tools in a cyber criminal’s arsenal today, given the ease with which they can deliver their attack through the relatively undefended route of email. Email breaches come in a variety of forms, but predominantly involve the use of a false identity – creating trust between the recipient…

Read More

6 Things You Should Have In Place to Protect your Systems

tools to protect IT network

In the modern digital age, our businesses need the security and reliability of our IT systems and infrastructure. Any outage or loss can seriously disrupt the efficiency and security of business operations, potentially creating financial loss, and breaching industry compliance obligations. Where to begin The security of your IT should be a priority but how…

Read More

Why DaaS makes sense for your small business

Why Embrace Workspaces Make Sense for Small Businesses Workspaces – a cloud-based virtual desktop service – improves your security, makes backups automatic and reliable, and keeps you in compliance if your business has specific regulations. It’s ideal for remote or work-from-home employees as they can work from your systems and share information from anywhere. All…

Read More

What is a Network Security Assessment/Penetration Test?

Cyber Security

A penetration test, often referred to as pen testing, is an evaluation of your organization’s network security. It identifies security weaknesses that expose your business to malicious attacks. Unlike a traditional vulnerability assessment that only identifies security vulnerabilities within the tested environment, a penetration test usually takes it a step further by demonstrating potential impact. This…

Read More