Category Archives: Cyber Security

A Beginner’s Guide to NFTs

NFT on phone - non-fungible token

The past few months have seen NFTs making waves all over the place. It’s hard to imagine not hearing reference to them in one form or another. Even though you’ve heard of them, it can be difficult to understand exactly what they are. The concept sounds complicated, especially with all the associated tech jargon surrounding […]

Where to Invest Your IT Dollars for Your Business in 2022

Where to Invest Your IT Dollars for Your Business in 2022

A tradition many Canadians enjoy for the start of a new year is making resolutions. Your new year resolutions can include anything from improving your health to learning new skills to connecting more often with family members. Creating a new year’s resolution helps motivate us to work towards a goal and inspires us to create […]

5 Things to Consider Before Purchasing Cyber Liability Insurance

cyber liability insurance - person sitting at laptop with security icons superimposed

As a business owner, you strive to do your best to protect your company’s assets and your customers’ private data, but is it enough? With the dramatic rise in cyber attacks in recent years, some companies wonder whether they should invest in cyber liability insurance. Before rushing out to purchase a policy, we have five […]

Cyber Security Lessons from 2021

cyber security lessons from 2021 - laptop with security icons floating above

If there is any lesson to take away from 2021, it’s that investment in cybersecurity to protect your business and your clients is still essential. Whether your business is small or global, if you collect confidential information from your clients, such as payment details, identification, and contact details, it’s your responsibility to protect that data […]

What to Do if Your Personal Data Is Compromised

what to do if personal data is compromised - cybersecurity - woman with hands on head looking shocked at laptop

It happens a lot more frequently than companies care to admit. You turn on the nightly news, and there is a report on a new data breach. With the rapid evolution of cyberattacks, it seems that no industry is immune. Whether it be a top government agency, a digital platform, international companies, or local businesses, […]

5 Ways to Shield Your Business from Cyber Crime During the Holiday Season

protect from holiday cyber crime - mother and child in santa hats use laptop on bed

The holiday season has traditionally seen increases in cybercrime activity. This year will likely be no exception. When the COVID-19 pandemic began, we saw a sharp rise in the number and sophistication of cyberattacks. This trend has not let up, with each passing quarter reporting new and evolving attacks. Cybercriminals target everyone from government offices […]

The Top 3 Cyber Security Risks for Mobile Devices and How to Avoid Them

mobile cybersecurity risks

How much time do you spend on your mobile device? A recent study shows that Albertans spend an average of ten hours a day looking at a screen. The category screen includes computers, laptops, TVs, cell phones, and other mobile devices. Between work and play, the majority of our day involves being online in some […]

How to Prevent Malware from Infecting Your Mobile Device

how to prevent malware

In 2017, a malware attack dubbed “The Joker” was found hiding in dozens of apps in the Google Play store, affecting thousands of Android users who unknowingly downloaded and installed the virus onto their devices. The virus then copied personal account and banking information. It secretly used that data to sign users up for other, […]

How to Spot a Fake or Fraudulent Website: Part One

magnifying glass over youtube logo - verifying an authentic or fraudulent website

Cyber scams evolve continuously. It can be challenging to stay on top of the latest cyber risks, from convincing phishing schemes to subversive malware attacks to fraudulent links. In the virtual world of today, almost any business can benefit from having a IT team of consultants in place to help you manage your network and […]