Leaders leverage our blog to stay up to date on latest cybersecurity practices and learn how to keep their data safe.

Spoiler alert: yes. Last month, here , we looked into phishing and some of the actions you could take to protect yourself. This month, we want to dive a little deeper into what makes email so...
The device most people carry around with them all day is swiftly becoming one of the biggest threats around. A mobile device, SmartPhone or tablet. With criminals continuously looking for soft...
When you hear the term ‘encryption’ you probably think ‘security’. That’s a fair enough assumption because encryption is how most of today’s online traffic is kept protected. The problem is that this...
The term ‘phishing’ has become rather common, hasn’t it? And we’re not talking about discussions between IT experts. After years of reports, studies & information sharing, consumers know the term and...
Let’s start at the beginning: What is phishing?
BUSINESS OF CANNABIS TO BE “PROTECTED BY” ALCiT
While technology has brought society many benefits over the years, it’s also a reality that these innovations carry risks. This is true when it comes to emails too, with a growing concern that a...
The conversation usually goes something like this: Hey, company X that (we do business with / my friend works at / we share some clients with…) just got ransomwared and were down for Y days/weeks, is...
Certain terms have become commonplace for anyone using the World Wide Web and a business network. ‘Anti-malware’ & ‘Firewall’ are some of these terms and these security features can be found on most...
A multi factor authentication (MFA) is a security system that requires multiple credentials so you can log into a digital account. Since we live in a digital era almost every task we do is performed...
As many of our customers, I am sure many of you are now working from home (if you can) and getting used to the new [temporary] normal. We wanted to provide a couple of tips and tricks to provide a...