Skip to main content

Posts

What is spam?

  Any unsolicited voice and data communication received without consent irrespective of its usefulness and intent can be considered as spam. Most common forms of spams are unsolicited email, text messages, phone calls and software downloads which happens at application layer. Various countries around the world including Canada had made certain legislation and laws to prevent spams referred as Canadian Anti-Spam Law (CASL).   More information about CASL can be found at https://www.fightspam.gc.ca/eic/site/030.nsf/eng/home   According to CASL spams can include -   unauthorized alteration transmitted data   which means any modification which was sent electronically should not be altered before it arrived to destined user. -         the installation of computer programs without consent while providing IT support or hitchhiking with other software download and installation -     false or misleading electronic representations as scam artist in form of phone call or website landing
Recent posts

Work from Home and Remote Access for Small Business

  Work from Home and Remote Access for Small Business   This pandemic has taught us many things and one of those things includes being flexible and adaptable in business. Not all business has opportunities to be completely flexible and adaptable according to business situations but all business has certain avenues to do so. Adaptability can be seen as being lean in operations, reduce overhead costs, revisiting technology and recurring expenses, offering employee flexibility, entering into online marketplace, creating digital presence and marketing, reducing maintenance costs are to name a few. If researched properly, many businesses needs just few small steps can help cover the basics and make business more flexible to be adaptable. Every business is different with varying scope of changes. Many businesses which are office based, who share common space and technology to perform day to day tasks. A work from home setup is very fruitful for those businesses as it allows to be lea

Phishing Email and how not become it's victim.

  Phishing is a technique used to extort personal information such your passwords or credit card numbers and other personal data. This consists of pretending to represent companies, brand or business organizations   you are users, account member or prospective buyers. This messages will ask you open webpage using the link provided and ask you to provide personal information yourself. These page links are redirected to fake pages which look alike original business website pages. When you log in to that page, the cybercriminals can steal your credentials. Further, they can use your username and password I to login and   could start sending unsolicited messages (spam) in your name and gain access to your contacts for more unsolicited access. Often, they target to mimic as financial institutions or e-commerce site where they can get access to credentials of your banking or your credit cards. Also, various contest winning or free wealth share messaging to get you excited and provide y

CYBERSECURITY BASIC TIPS - How to protect yourself from hacking ?

Cyber Security and Small Business - The dilemma

 Cyber Security and Small Business - The dilemma With technological advances and presence of pandemic, businesses are learning to find better ways and alternative ways to carry on the business, grow the business and connect with their current and potential clients. One of most sought solution is online presence in digital internet world. With more and more businesses are going online or at least creating online presence to get more exposure and reach, they are unaware that these newly created two connection can bring smiles as well as sorrows.  Internet is just not about sales, marketing, happiness, fun, cat videos but also has dark side - spams, scam, virus, malware, DDoS, Phishing, Pharming, hacking, bots, worms, ransomware and more. With so many tech genius lurking to make easy money by finding victims, a business is often a desirable target. They can exploit the vulnerabilities and take advantage of your network directly or indirectly but affecting or denying access to internet, to

Common Cyber Threats

With changing technology, everyday new kinds of threats showing up in different forms. The most common threats to be aware of HACKING :  Any unauthorized access to a computer by using different tools or techniques or software(malware). An intruder finds weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information. Often installs a Trojan horse, providing a back door for hackers to enter and search for your information. MALWARE :   Mal icious Soft ware (Malware)  is one of the more common ways to infiltrate or damage your computer  such as computer viruses, worms, Trojan horses, spyware, and adware. Also uses intimidate you with scareware, which provides false information like security or virus issues. These malware can alter or delete files or reformat the hard drive of your computer causing you to lose all your information or steal sensitive information. Also, it can take control of your computer and all the software running on it.

Is your business IT network secured ?

Is your business IT network secured ? Answer to above question is typically "Yes" but in truth most of the small businesses doesn't actually know what level of security they have and if it's sufficient to protect there IP and clients privacy. Irrespective of size or type of business, your online portal or entrance facility is always prone to attack or intrusion. Being safe is better than being sorry. That said, how to discover what level you security you need, what level of security you have have and how to upgrade or transition ? Answer to all of the above question is - Network Security Analysis or Auditing.  Self explanatory by name, it allows to understand your security, upgrade and monitor the performance on regular basis before it's too late. Without auditing system, a system can be consider as fragmented, it's connected and working but conditionally as long as not affected by external factors. Auditing allows to understand the layers, zones, da