Fantom: the latest cybersecurity spectre

The heart of a lady is not easily won; a man can’t rely on his looks or wallet to make a girl fall head over heels. He must charm his way into her heart. Let’s say that a computer user is the woman, and that ransomware, the man, is the dreamboat that has worked his way through all the woman’s defenses.

Seven tips to Master Microsoft Excel

When was the last time you used Microsoft Excel? And no, hovering over the icon doesn’t count. If it’s taking you too long to remember, then it probably is. Digital literacy is an essential part of finding a job these days, in fact taking a look at it further reveals that proficiency in Excel is a skill still sought after by most companies.

Ransomware alert for healthcare practices

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.

How to switch securely to Office 365

The decision to migrate from an on-site SharePoint system to a cloud-based Office 365 solution isn’t one that most small or medium-sized businesses take lightly. In fact, though the popularity of Office 365 and other cloud-hosted platforms continues to soar, plenty of companies still have legacy SharePoint systems in place for at least part of their operations.

IT Security Policies you need to implement

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, and this is why employee mistakes are one of the most common causes of a security breach. So what can you do to prevent it? Well at the very least you need to include policies in your employee handbook, and ensure your employee reads through it and signs off on agreeing to abide by them.