The LastPass Breach, and How it Might Affect You 

LastPass Security Passwords

In August of 2022, LastPass announced that one of their developer accounts had been compromised, with the attackers having stolen some of their source code. They said at the time that none of their customer data had been taken. However, in December, they announced that information gathered during that attack had subsequently been used to …

Read more

Cybersecurity Updates – December 2022

Authentication Types Passwords Security

Cybersecurity Topics in This Month’s Update: Understanding Authentication Types MFA Fatigue Attacks are an Ongoing Threat to Business Understanding Authentication Types With the recent news talking about how Google is adding support for passwordless authentication to Chrome and Android, you might be wondering what all this means to you, and how this all works.  I …

Read more

6 Reasons Why you Should Partner with an MSP for Strategic IT Support

How businesses view IT support has changed dramatically over the years. For many business owners, it was believed that IT support was the small group that keeps the internet functional and fixed the occasional printer. However, that environment has shifted and many businesses realize that IT support is now critical for their business and can …

Read more

IT Workers are Hard to Find and Keep in 2022

According to a survey titled The Impact of Technology in 2022 and Beyond: on IEEE Global Study, 97 percent of IT leaders agree on two things: Their team is working more closely with human resource leaders to implement workplace technologies And that the entire process will take longer than expected because staff shortages are abundant …

Read more

How often should you audit your cyber security & who should do it?

Adopting cyber security measures for any business is a good thing. However, many companies assume that once these systems are in place, everything is fine. Cybersecurity isn’t a one and done deal, rather it demands consistent improvements. And one way to test the cybersecurity measures is through regular audits. Cybersecurity audits are complex, time-consuming, and …

Read more

Is Antivirus necessary for my small business?

Without question, every small business owner knows that everything in their business is a priority. With a limited budget, small businesses need to ensure they’re getting the most results. Security isn’t always a top concern for many. Businesses today rely heavily on several digital components. If a computer or network gets compromised and businesses can’t …

Read more

What is Social Engineering?

Social engineering is the technique involving manipulating people into giving away confidential information. Passwords to sites, banking information, credit card numbers, personally identifiable information. Anything goes. The types of information criminals are looking for can vary of course, along with the techniques that are used to tricking people. Regardless, it all falls back to something …

Read more

Cost Effective Data Security Best Practices in the Workplace

Security Solutions

Data security within the workplace is growing to be a larger concern for businesses. Fortunately, there is a lot of infrastructure and information broadly available. Security wise, some will suggest having a physical building check at the end of the work day. Other security measures can be as simple as checking vulnerabilities that could lead …

Read more

How to unlock the root cause of computer incidents

Whether your computer is attacked or you run into a technical difficulty, the usual methods are to be reactive in these circumstances. However, we can no longer afford to do that as hackers are becoming more sophisticated and people are understanding the costs behind reacting to every technological problem. A proactive approach is more appropriate …

Read more

Backup and Disaster Recovery Planning for Small Businesses

As cyberattacks keep rising year after year, the more need small businesses should have in formulating a backup plan and contingencies to recover from disasters. There have been several examples over the span of years where organizations experienced attacks and had to shut down their business for a period of time – or worse, indefinitely. …

Read more