Information to help you understand the basic ideas or facts.

Microsoft Teams at 3: Everything you need to connect with your teammates and be more productive

What’s new in Teams?

  • Real-time noise supression helps to minimize distracting background noise
  • Raise hand feature lets anyone in the meeting send a visual signal that they have something to say
  • Pop out chats into a separate window to easliy move between conversations
  • Offline and low-bandwidth support lets you read chat messages and write responses, even without an internet connection

Read the full article by Jared Spataro, Corporate Vice President for Microsoft 365.  He talks about Microsoft’s commitment to two things: building the very best online meeting experience for customers and bringing technological solutions to traditionally underserved professionals, including Firstline and healthcare workers.

Read More…

Basics: How to Reduce Ransomware Risk

Ransomware attacks happen more than you think.  This is why we keep talking about.  Even just doing the basics can reduce your risk.

This article from Entrepreneur magazine are just a few of the tips you’ll get when you read this blog by Robert Siciliano.

Read More…

Advanced threat protection is important, too. Contact Results Matter Cloud Services to learn about your cyber security options.  Our Email ID Shield solution delivers proactive monitoring for compromised credentials.

Is Cloud Hosting the Best IT Solution for Your Business?

If you are a small business without dedicated IT resources, you need to plan carefully what and when you move to the cloud.

Moving email and collaboration to the cloud is a no brainer small business. It is easy to outsource the setup and management of this solution for a very low monthly cost.

Considerations for moving computing to the cloud need to be evaluated on a case by case basis.  Make sure you look at the hard and soft cost of moving to the cloud.

Whether it’s being able to access a rich ecosystem of supportive apps or having immediate knowledge of your finances, the cloud can offer a wealth of benefits.

At Results Matter Cloud Services, it’s important to us that our clients have the support and knowledge they need as they make decisions and upgrade their IT infrastructure.

With our customer support focus, we will provide your company with the resources and knowledge of our industry experts so you can achieve more with your transition.  When you are ready reach out to learn more.

2019 Resolutions for Cyber Security – How Are You Doing?

Is your team educated, using 2FA, and clicking cautiously?

Office 365 Helps Solo Entrepreneur Scale His Brand

We’re excited to show you how #Office365, a productivity tools that lets you do your best work, gives Bryce McDonald what he needs to do his best work.


He is a solo entrepreneur who relies on an extensive network of vendors and partners to help him scale DAY 1 Wake, his wakesurf board making business, out to the world. No matter your size, business or industry, Results Matter Cloud Services can help you work easily and flexibly, just like Bryce. Check it out!

These tools need to always be up-to-date. They also need to have the information that matters most to you, available and accessible – anywhere, anytime.

5 Cyber Security Tactics for 2019

Cyber security issues were more severe than last year. The number of attacks and breaches increased as did the tools and processes for defending against them.

The number of police-reported cybercrimes in Alberta has increased by 185% between 2014 and 2017, according to a recent Statistics Canada report. This represents the largest increase in Canada.

Here are some of the numbers for 2018:

    • Marriott Starwood Hotels reservation system, personal information of 500 million customers over four years
    • Bell Canada hackers accessed personal information of around 100, 000 customers
    • Bank of Montreal and CIBC’s Simplii Financial were hacked
    • Ransomware attacks on the municipalities of Wasaga Beach and Midland, Ontario, along with Mekina, Quebec

More challenges require us to adopt multiple tactics.

Cyber security spending is increase at a rate of between 9 and 12 percent each year.

  1. Have a Plan: Know how you will recover from ransomware because we are all targets.
  2. Create a Security Culture: Make security a core value. Building security in at the start, leaders that are engaged, and holding teams accountable for compliance are part of creating the culture.
  3. Adopt MFA: Multi-factor authentication is needed beyond more than just VPNs and privileged accounts.
  4. Use a Password Manager: This will ensure unique passwords across platforms and ensure business credentials are different from personal ones.
  5. IT and Business Aligned: Ensure the team managing your IT security has solutions aligned with the RTO (recovery time objective) and RPO (recovery point objective) that meet your business needs.

We have to fight against complacency and keep working at it.

 

Sources:

Passwords Must Be Unique For Each Website or App – MyFitnessPal

The MyFitnessPal app suffers a data breach. What does that have to do with your business? You need to make sure you continue to educate your work team about the importance of having different passwords for accounts you use for work vs accounts you use personally.  If a member of your team used the same password to access MyFitnessPal as is used to access websites related to work, you could be at increased risk.

The 3 things you need to do:

  1. Discuss passwords with your team. Moving from awareness to action improves when you can make it real. This is real.
  2. Have a common sense security policy that is understood, implemented and test it. Moving to compliance starts with education and repeat offenders need to be treated seriously.
  3. Review your security strategy. If you don’t have a strategy for cyber security you will only be able to react. Being proactive gives you more options.

#MyFitnessPal #Databreach

Phishing Scams – How to Prevent a Disaster


Imagine this. You’re scrolling the internet and your instant messaging pops up. It’s someone you talk to quite frequently, and they’ve sent you a link telling you to check it out. You click the link, and suddenly your files start changing and you can’t open anything. Suddenly you’ve become a victim of a phishing scam.

What just happened?

You sit there confused, but in the back of your mind you understand the link you clicked was not what it seemed to be, and are now wondering what it will take to get the information back?

Phishing is a common cyber crime that has hit many unsuspecting people, and sometimes the results are harmless. Sometimes you are only locked out of your online accounts for few minutes. But other times serious damage can begin the minute your mouse clicks the link.

Hackers target companies and individuals by email, and most people see a link in an email and don’t even consider it is going to be detrimental to click.

A good rule to follow is to limit the links you do click in email messages.  Remember, when protecting yourself from phishing scams, pay attention to the where the link is going to take you, be skeptical of email attachments and pay close attention to the sender email address.

If something looks suspicious, taking the time to check and be sure makes sense.

Getting to a place where you understand how to protect yourself takes effort and some training. This training has come a long way over the years.

Find out how a few quick and focused training sessions can help you and your team improve your skills.  Ask us about some options for effective cyber security training.

World Password Day 2018

How secure are you?

Passwords are your first line of defense when it comes to protecting your private systems and information. Having a strong password in place leaves you just that much more secure.

On May 3, 2018, we celebrated World Password Day, and the facts are simple; most people either don’t understand the importance of a secure password, or don’t want to take the time to ensure information is protected in the simplest way.

I don’t know about you, but I’m just as guilty as the majority of the population for having the same password across the board, changing up one number or letter per platform. Just like you, I’ve left myself extremely vulnerable to hackers of any level.

With digital platforms filling up most of your spare time, it’s important to adhere to the rules and suggestions. Each of these platforms ask for a different sequence of characters, for good reason.

According to Entrepreneur Online, a survey was conducted by TeleSign a few years ago, which polled approximately 2,000 consumers throughout the U.S. and the U.K. The study concluded about 3 out of 4 people use duplicate passwords, some of which haven’t been changed in years.

Good to know I’m not the only one who could lose everything.

In the past year alone, about 40% of people received noticed of personal information being compromised, accounts being hacked, or have had a password stolen. Data breaches are inevitable. Therefore, why aren’t you taking better measures to protect your information.

When is the last time you changed your password? In the same survey, mentioned above, about 21% of people still use passwords they created 10 years ago. If you can’t remember the last time you changed your password, I highly suggest you take the time today to do so.

Keep them long, complicated, a sequence of numbers and letters. You can even generate up passwords for free online. Whatever you do, your password should not be something that can be guessed. No birthday’s please. Pet names are out too.

The next step you can take is to add another level of security. Two-factor authentication is a great way to significantly decrease the risk of any hacker. This method requires an additional type of identification, of which the user has on them at the time.

Passwords are inevitably a part of everyday life, and to be careless with them is simply asking for the worst to happen. Whatever method you use, being aware of how secure you are is detrimental for a future dealing with technology.


If you are curious as to how secure your password is visit www.howsecureismypassword.net. Enter in a password SIMILAR to the one you currently have and sit back and see how long it would take a hacker to enter your system.