Leaders leverage our blog to stay up to date on latest cybersecurity practices and learn how to keep their data safe.

The term ‘phishing’ has become rather common, hasn’t it? And we’re not talking about discussions between IT experts. After years of reports, studies & information sharing, consumers know the term and...
Let’s start at the beginning: What is phishing?
BUSINESS OF CANNABIS TO BE “PROTECTED BY” ALCiT
While technology has brought society many benefits over the years, it’s also a reality that these innovations carry risks. This is true when it comes to emails too, with a growing concern that a...
The conversation usually goes something like this: Hey, company X that (we do business with / my friend works at / we share some clients with…) just got ransomwared and were down for Y days/weeks, is...
Certain terms have become commonplace for anyone using the World Wide Web and a business network. ‘Anti-malware’ & ‘Firewall’ are some of these terms and these security features can be found on most...
A multi factor authentication (MFA) is a security system that requires multiple credentials so you can log into a digital account. Since we live in a digital era almost every task we do is performed...
As many of our customers, I am sure many of you are now working from home (if you can) and getting used to the new [temporary] normal. We wanted to provide a couple of tips and tricks to provide a...
I wish I did not have to write this one, but it looks like I must. In these times of chaos, where we all should be focusing on the safety of our families, friends and communities, it appears that...
If you look at a standard maturity index for processes (such as COBIT or ITIL), they propose five level:
Meeting room systems have always been full of issues. In our experience, these are the main ones: