Blog

15
Oct
ICANN WHOIS

It seems like the problem of spam is getting worse and worse. One of the reasons it can feel oppressive is the number of areas it can hit you: your inbox, your phone, even by text message today. Business owners get a lot of spam.  One of the best ways to limit this plague is […]

15
Sep
passwords

The cybersecurity threats facing businesses today are more persistent and costly than ever.  But one of the best defenses remains simple: having good passwords in place. Here’s a reminder of some common practices you should be avoiding. Practices to Avoid –Don’t use your family name (or your spouse or kids’ first names) –Don’t use important […]

15
Aug
windows 365

Microsoft offers two main suites of software that millions of businesses around the world use: Office 365, its online version of Office applications, and Windows, its operating system (the latest version being Windows 10). Microsoft 365 is relatively new offering that combines Windows 10 and Office 365 as a single, online-accessible subscription product.  Microsoft 365 […]

5
Jul
mobile phones

If your business doesn’t have a Mobile Device Management (MDM) solution in place, now is the time to get it set up.  MDM software allows your business to manage network access and safeguard private data as your employees use their personal mobile devices for work. MDM software can be set up in a way that […]

4
Jun
visa logo

In the news last week were widespread reports of Visa cards not working at millions of businessess throughout England and Ireland. Given the frequency of ransomware attacks and data breaches, many naturally assumed the outage was the result of a hack. Not so, says Visa. The cause was ‘hardware failure.’  According to the company ‘[t]he […]

6
May
cyber liability

Cyber insurance (also known as cyber liability insurance) has become a more and more popular product over the last ten years–especially for small and medium-sized businesses. The increasing cost, frequency and legal liability associated with data breaches is driving the rise.  (It’s also being driven by companies requiring their third-party contractors to have it.) Cyber […]