2019 Resolutions for Cyber Security – How Are You Doing?

Is your team educated, using 2FA, and clicking cautiously?

Office 365 Helps Solo Entrepreneur Scale His Brand

We’re excited to show you how #Office365, a productivity tools that lets you do your best work, gives Bryce McDonald what he needs to do his best work.


He is a solo entrepreneur who relies on an extensive network of vendors and partners to help him scale DAY 1 Wake, his wakesurf board making business, out to the world. No matter your size, business or industry, Results Matter Cloud Services can help you work easily and flexibly, just like Bryce. Check it out!

These tools need to always be up-to-date. They also need to have the information that matters most to you, available and accessible – anywhere, anytime.

5 Cyber Security Tactics for 2019

Cyber security issues were more severe than last year. The number of attacks and breaches increased as did the tools and processes for defending against them.

The number of police-reported cybercrimes in Alberta has increased by 185% between 2014 and 2017, according to a recent Statistics Canada report. This represents the largest increase in Canada.

Here are some of the numbers for 2018:

    • Marriott Starwood Hotels reservation system, personal information of 500 million customers over four years
    • Bell Canada hackers accessed personal information of around 100, 000 customers
    • Bank of Montreal and CIBC’s Simplii Financial were hacked
    • Ransomware attacks on the municipalities of Wasaga Beach and Midland, Ontario, along with Mekina, Quebec

More challenges require us to adopt multiple tactics.

Cyber security spending is increase at a rate of between 9 and 12 percent each year.

  1. Have a Plan: Know how you will recover from ransomware because we are all targets.
  2. Create a Security Culture: Make security a core value. Building security in at the start, leaders that are engaged, and holding teams accountable for compliance are part of creating the culture.
  3. Adopt MFA: Multi-factor authentication is needed beyond more than just VPNs and privileged accounts.
  4. Use a Password Manager: This will ensure unique passwords across platforms and ensure business credentials are different from personal ones.
  5. IT and Business Aligned: Ensure the team managing your IT security has solutions aligned with the RTO (recovery time objective) and RPO (recovery point objective) that meet your business needs.

We have to fight against complacency and keep working at it.

 

Sources: