Resources for you and your industry.

Phishing Scams – How to Prevent a Disaster


Imagine this. You’re scrolling the internet and your instant messaging pops up. It’s someone you talk to quite frequently, and they’ve sent you a link telling you to check it out. You click the link, and suddenly your files start changing and you can’t open anything. Suddenly you’ve become a victim of a phishing scam.

What just happened?

You sit there confused, but in the back of your mind you understand the link you clicked was not what it seemed to be, and are now wondering what it will take to get the information back?

Phishing is a common cyber crime that has hit many unsuspecting people, and sometimes the results are harmless. Sometimes you are only locked out of your online accounts for few minutes. But other times serious damage can begin the minute your mouse clicks the link.

Hackers target companies and individuals by email, and most people see a link in an email and don’t even consider it is going to be detrimental to click.

A good rule to follow is to limit the links you do click in email messages.  Remember, when protecting yourself from phishing scams, pay attention to the where the link is going to take you, be skeptical of email attachments and pay close attention to the sender email address.

If something looks suspicious, taking the time to check and be sure makes sense.

Getting to a place where you understand how to protect yourself takes effort and some training. This training has come a long way over the years.

Find out how a few quick and focused training sessions can help you and your team improve your skills.  Ask us about some options for effective cyber security training.

World Password Day 2018

How secure are you?

Passwords are your first line of defense when it comes to protecting your private systems and information. Having a strong password in place leaves you just that much more secure.

On May 3, 2018, we celebrated World Password Day, and the facts are simple; most people either don’t understand the importance of a secure password, or don’t want to take the time to ensure information is protected in the simplest way.

I don’t know about you, but I’m just as guilty as the majority of the population for having the same password across the board, changing up one number or letter per platform. Just like you, I’ve left myself extremely vulnerable to hackers of any level.

With digital platforms filling up most of your spare time, it’s important to adhere to the rules and suggestions. Each of these platforms ask for a different sequence of characters, for good reason.

According to Entrepreneur Online, a survey was conducted by TeleSign a few years ago, which polled approximately 2,000 consumers throughout the U.S. and the U.K. The study concluded about 3 out of 4 people use duplicate passwords, some of which haven’t been changed in years.

Good to know I’m not the only one who could lose everything.

In the past year alone, about 40% of people received noticed of personal information being compromised, accounts being hacked, or have had a password stolen. Data breaches are inevitable. Therefore, why aren’t you taking better measures to protect your information.

When is the last time you changed your password? In the same survey, mentioned above, about 21% of people still use passwords they created 10 years ago. If you can’t remember the last time you changed your password, I highly suggest you take the time today to do so.

Keep them long, complicated, a sequence of numbers and letters. You can even generate up passwords for free online. Whatever you do, your password should not be something that can be guessed. No birthday’s please. Pet names are out too.

The next step you can take is to add another level of security. Two-factor authentication is a great way to significantly decrease the risk of any hacker. This method requires an additional type of identification, of which the user has on them at the time.

Passwords are inevitably a part of everyday life, and to be careless with them is simply asking for the worst to happen. Whatever method you use, being aware of how secure you are is detrimental for a future dealing with technology.


If you are curious as to how secure your password is visit www.howsecureismypassword.net. Enter in a password SIMILAR to the one you currently have and sit back and see how long it would take a hacker to enter your system.

 

The Importance of a Basic Backup Strategy

Are you prepared with a basic backup?

It doesn’t always take someone malicious to hack your computer system, but regardless of the reason, if a business is shut down for any matter of time, revenue is lost. The first step in running any business is ensuring there are basic backup plans in place.

Picture this; a freak September snowstorm sends the city into panic. Tree branches are breaking from the weight of the snow, and one just happens to fall on the power line closest to your downtown office. The power goes out and your building is plunged into dark.

Power goes out, operations stop. All your files are now gone and without any way of getting them back, you’re starting at the bottom again.

When breaches occur, for any reason, operations and finance are the first things to be affected, and the network outages caused usually have long-lasting impact. Most businesses cannot come back from even three days spent at a standstill.

So what can you do?

By following the 3-2-1 rule, when it comes to a basic backup strategy, your company will be laughing during the next storm.

Your backup plan should be thought of like this; there should be 3 total copies of data, 2 of which are local, but on different mediums, and at least 1 copy that is offsite.

The local copy is what users rely on for primary access.

  • One of the easiest ways to create a backup is to store copies on any network attached storage, an external hard drive, or a USB drive.

Backup local copy to a local avenue.

  • Gives user immediate, instant access to whatever data needed, despite if it’s been deleted, overwritten, or lost.

Store a copy of all files securely offsite.

  • This helps in the aforementioned disaster. Regardless if something happens to the physical place of business, all data is still safe and secure.
  • There are many cloud-based solutions, which store information on remote servers which are accessed through the Internet.

Regardless of how you are backing up your data, the first step in protecting your business is having that backup plan. Every minute your team is without access will cost more than just revenue.

Take a look at how much it would cost your business if your systems were unavailable.  Try our online calculator yourself or give us a call 403-455-5969. The results might surprise you.

 

 

 

 

Privacy Settings Keeping Users Safe

Mobile device with social icons in front of keyboard.      “Click yes to submit your information.”

This is a common sentence read on most social media platforms, regardless of how often you sign in. It can be scary to users, not understanding just exactly how privacy settings work.

People have, in a sense, all but signed their life away to these online platforms. For all those who don’t seem to care about the privacy settings, there are many more who do.

You often hear of a data breach and wonder if you should be cancelling your credit cards, or worrying about a stolen identity. With so much news circling through the media it can be overwhelming. Especially if you don’t understand what to do to keep yourself safe.

Platforms like Facebook, or even Google to some extent, aren’t nefarious in nature. The goal isn’t to convince you to sign up and sign over all your private information. The site algorithms are designed to make a user friendly feed that gives you exactly what you want, be it fitness ideas, food recipes, or simply an add for that perfect car you’ve been searching for online.

By signing up for these platforms, you are giving the providers permission to use your personal data in any way they see fit. This doesn’t mean you have to stop using Facebook. Personally, it is a great tool to use for business outreach, communication with family and friends, and many other more mundane research; but it is a tool that should be used with caution.

Here are a few tips, for those who enjoy the use of social media, to keeping your personal and private life just a bit more secure:

  1. Restrict your personal information – any personal information online can be used. It’s public and anyone will see it as such. A birthday or birthplace can be used to access accounts, or that post saying you’re away traveling could be a perfect in for thieves looking to score.
  2. Control what strangers see – the more available information for those not in your friends list, the more vulnerable you become. Simply restricting your settings can be a sigh of relief.
    You can do this by going to Settings and Privacy and go to “Who can see my stuff?”
    As you play around with your settings you can always preview your profile to get a good idea of just exactly what it is you’re sharing.
  3. Control what friends see and do on your page – Strangers are one thing, but you can control what happens between you and your friends as well. When posting and reposting, there are options to show the public, only those on your friends list, close friends, etc. This gives you complete control on who can comment, share, or interact with your information. All this can be done on each individual status alone, or through Settings and Privacy as well.
  4. Disable Location Tracking and be careful of interaction with third party apps – Every interaction with any app that links through Facebook is just another way that your information is being constantly collected. Once again, through Settings and Privacy, you can check off which apps you are okay with, and which ones you want to disable.

Facebook is constantly updating it’s features, and how it interacts with you. It’s important to not only monitor the things you share, and those who get to see it, but also that the settings you’ve put in place haven’t been disabled. Familiarizing yourself with all privacy settings allows you to understand, to a greater extent, what is being put out into the interweb. It allows you to control it also.

Winter Games Hit by Cyber Attack

The PyeongChang Winter Games were hit by a cyber attack, and although critical operations were not affected, event organizers were forced to shut down servers. The official games website also had to be taken offline to prevent further damage.

With cyber attacks rising in past Olympics games, this most recent attack in South Korea won’t be the last. According to the article, written by Aaron Tan, Japan is already bracing itself for more cyber attacks, aimed at the Tokyo Olympics in 2020.

Read the official article here.

Cyber Security for Marketers

Cyber Security for Marketers: Four Tips to Get Started

Esther Jeohn, head of global marketing at Penta Security Systems Inc, gives information on how you can deflect or even block the cyber-breach blow. Reading these four tips will give you and your PR team ideas on how to stay protected when it comes to cyber security. With the majority of marketing work done on the go, many of the platforms used are Cloud-based.

“The myriad of platforms make my workflow a whole lot easier, but the lack of integrations into one seamless platform inevitably means that information is being distributed to multiple locations. That information could be anything from company financial figures to customer contact information—which, if it fell into the wrong hands, could mean bad business,” says Jeohn in the article, which can be found here.

What can you do, as a marketer, to keep yourself and your company protected?

How One Hacker Stole $226K Worth of Cryptocurrency from Oracle Servers

According to a recent article published from Techrepublic, an Oracle vulnerability released in December allowed attackers to mine the Monero cryptocurrency.

One hacker was able to deploy a cryptocurrency miner and rake in 611 Monero coins worth roughly $226,000, according to a report from the SANS Institute.

“The good news is that Oracle patched the flaw last year. However, firms that aren’t regularly updating may still be at risk. According to the report, the vulnerability affects versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0, and 10.3.3.0,” stated writer Connor Forrest.

To read the full article, click here.

The 20 Worst Passwords of 2017

Passwords are the first line of defense when it comes to protecting your vital information. Let the common phrases like “password” and “123456” go. It’s still surprising how many people use bad passwords.

Use a whimsical phrase you will remember, then add numbers and special characters. Protect yourself.

Read the article from Techrepublic here.

What is Your Business Continuity Plan?

Did you know, 40% of small businesses in the US never open their doors after a disaster? That’s a big number considering most small business owners not only rely solely on their business as a means of income, they also are emotionally attached to their business since it provides a way to present their skills to the world.

So if their business is so important to them, then why are many small business owners not doing enough to protect it from disasters? In a 2015 survey of 300 small businesses in Calgary, 47% of businesses said they do not have a business continuity or contingency plan in place. That’s a big number considering this survey was conducted not long after the 2013 floods.

Now, while no business would want to get hit by unexpected disasters, it does not mean that owners should not plan for them either. Business Continuity planning is the similar to yearly budget planning or even better: it is like getting insurance!

Think about it: many people get life insurance because they are looking out for their family’s future in case they are no longer around. If you are one of the family earners, you secure your family by getting life insurance. While the emotional pain of you being gone can never be filled, you try to mitigate at least the financial pain by taking out life insurance for them.

This is exactly what business continuity planning does. Like I said earlier, for many small business owners, their business may be the only source of income for them and they build an emotional attachment to this business and just like we do to our loved ones.

So wouldn’t you want to protect this business from any potential disasters?

Here are some helpful links from Calgary Chamber of Commerce and Calgary Emergency Management Agency (CEMA) that you can use to start thinking about business continuity planning:

  1. CEMA’s Business Continuity Handbook
  2. Business Continuity Planning Template
  3. Reference Guide for examples

Contact us if you need some guidance on how to incorporate your IT related assets in the Business Continuity Plan.

Do You Have A Business Continuity Plan?

Thirty per cent of business don’t!

At some point in the lifespan of any business, disaster will strike. It’s inevitable. From unsuspecting employees letting lose ruthless viruses, to something much less preventable, such as an electrical fire, any loss of data can be detrimental. The key component to managing any business is having a business continuity plan, so that when disaster recovery is needed, it’s only a phone call away.

In a previous post, we talked about the importance of data backup. Making sure your data is backed up in the proper mediums is fantastic but, having a plan with what to do once the system crashes is just as crucial as saving the data itself.

This is where the idea of business continuity comes into play. Having the ability to continue running your business during these emergency cases will minimize revenue loss, as every minute a server is down is a hit to the company.

There are many examples available of companies that were saved simply by having a backup plan in place, such as the one about Cantey Technology, who lost its entire operation to a lightning strike in 2013.

According to Tracy Rock, InvenioIT.com, the office building in Mount Pleasant, South Carolina, was home to the IT company, which hosted servers for more than 200 clients.

The fire caused the entire network infrastructure to melt, burning cable and computer alike. With equipment destroyed beyond repair and an unusable office, a panic should have set about the entire organization. Instead, states Rock, Cantey’s clients had no idea.

As part of their business continuity plan, Cantey had already moved its clients servers to a remote data center, where continual backups were stored. Staff of Cantey were displaced in a temporary office, but no client experienced any disruption of service. Although Cantey Technology had no control over the force of nature, they were still able to avoid massive loss.

Businesses always believe it won’t happen to them, that the backups they have are enough, but the reality is, they aren’t.

According to InventoIT’s 2017 disaster recovery statistics, hardware failure was the leading cause of all unplanned downtime, with power outages accounting for an additional 35 per cent

Even with backups, if a company isn’t sure what to do once the power goes out, there is still unplanned downtime that adds up. Costing between $926 to $17,244 per minute, these numbers include lost revenue, lost productivity, recovery expenses, equipment replacement, and more.

The same statistic report mentioned that 30 per cent of businesses do not actually have a business continuity plan in place, and a portion of those companies haven’t even talked about it.

With the inevitability of a disaster strike, do you want to be apart of that 30 per cent?


If you are curious as to how much your business would lose in the event of a disaster you can input all your data into our online calculator. The results might shock you.