Skip to main content

Posts

Showing posts from November, 2020

What is spam?

  Any unsolicited voice and data communication received without consent irrespective of its usefulness and intent can be considered as spam. Most common forms of spams are unsolicited email, text messages, phone calls and software downloads which happens at application layer. Various countries around the world including Canada had made certain legislation and laws to prevent spams referred as Canadian Anti-Spam Law (CASL).   More information about CASL can be found at https://www.fightspam.gc.ca/eic/site/030.nsf/eng/home   According to CASL spams can include -   unauthorized alteration transmitted data   which means any modification which was sent electronically should not be altered before it arrived to destined user. -         the installation of computer programs without consent while providing IT support or hitchhiking with other software download and installation -     false or misleading electronic representations as scam artist in form of phone call or website landing

Work from Home and Remote Access for Small Business

  Work from Home and Remote Access for Small Business   This pandemic has taught us many things and one of those things includes being flexible and adaptable in business. Not all business has opportunities to be completely flexible and adaptable according to business situations but all business has certain avenues to do so. Adaptability can be seen as being lean in operations, reduce overhead costs, revisiting technology and recurring expenses, offering employee flexibility, entering into online marketplace, creating digital presence and marketing, reducing maintenance costs are to name a few. If researched properly, many businesses needs just few small steps can help cover the basics and make business more flexible to be adaptable. Every business is different with varying scope of changes. Many businesses which are office based, who share common space and technology to perform day to day tasks. A work from home setup is very fruitful for those businesses as it allows to be lea

Phishing Email and how not become it's victim.

  Phishing is a technique used to extort personal information such your passwords or credit card numbers and other personal data. This consists of pretending to represent companies, brand or business organizations   you are users, account member or prospective buyers. This messages will ask you open webpage using the link provided and ask you to provide personal information yourself. These page links are redirected to fake pages which look alike original business website pages. When you log in to that page, the cybercriminals can steal your credentials. Further, they can use your username and password I to login and   could start sending unsolicited messages (spam) in your name and gain access to your contacts for more unsolicited access. Often, they target to mimic as financial institutions or e-commerce site where they can get access to credentials of your banking or your credit cards. Also, various contest winning or free wealth share messaging to get you excited and provide y