Assessing your MSP in the first appointment

Assessing your MSP in the first appointmentHanding over your IT to a MSP is a major decision. Who do you choose and more importantly, how? While there’s no rulebook that will tell you exactly how to proceed, here are a few hints that can help you decide how invested...

Ransomware emails: How to identify

Ransomware emails: How to identify and steer clear of themRansomware attacks have suddenly become more prevalent. Each year sees more of them. Hospitals, NPOs, shipping giants, etc., have all been victims of ransomware attacks. Your business could be too! Did you know...

How good is your password

How good is your password?Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related to passwords that you can follow to ensure passwords are not your weakest link. Avoid sequences and...

Think you are too small

Think you are too small to be targeted by a cybercriminal? Think again.When I meet with clients, especially SMBs, I often hear them say that they feel their business is too insignificant to be a target of cyber-criminals. Why would someone go after my business when...