Posts

Protect Your Employees and Your Business Against Vishing

Key Points The increase in remote and hybrid workforces has created new opportunities for bad actors. Vishing is a type of fraud where criminals attempt to obtain sensitive information such as usernames, passwords, and credit card details by masquerading as a reputable entity. Bad actors typically do this by making voice calls or leaving voicemails…

Read More
Share

Four Steps You Must Take Today to Safeguard Your Business Against Phishing Attacks

Key Points in This Article: Businesses of sizes and industries must contend with phishing attacks which, if successful, can be devastating. Having a plan in place is crucial to mitigate the risk of phishing. Training employees, managing passwords, updating software, and securing mobile devices are steps you must take to safeguard your business. No matter…

Read More
Share

Three Ways Managed Services Providers Can Help Your Business Grow

Key Points in This Article Working with an MSP can provide businesses with the necessary resources to grow. MSPs can help businesses save time by absorbing time-consuming yet fundamental tasks. They can also help companies save money by leveraging their insights and experience to increase productivity and offer specialized services where there are gaps in-house….

Read More
Share

Ontario’s Employee Monitoring Policy: What You Need To Know

Key Points As of October 11, 2022, all employers in Ontario with 25 or more employees must have an electronic monitoring policy. Electronic monitoring can include surveillance devices, GPS tracking, and keylogging software. The electronic monitoring policy must state whether or not employees are being monitored. Employers who fail to post a policy or do…

Read More
Share

What Your Business Needs to Know About Protecting Customer Data

Key Points: The Federal Trade Commission (FTC) sets standards for safeguarding customer information. The Safeguards Rule took effect in 2003 but was amended in 2021 after public comment to ensure the rule keeps pace with the current technology. The revised rule offers in-depth guidance for businesses — reflecting the core data security principles that all…

Read More
Share