<img alt="" src="https://secure.dawn3host.com/211761.png" style="display:none;">
Keeran Networks Blog

MSPS IT Blog

    Cybercrime in the time of COVID-19.

    This is a re-sharing of an article I created for LinkedIn about a week ago that has only continued to gain more relevance. I hope that as information spreads we can hopefully limit the havoc that these bad-actors continue to unleash.

    I'm seeing a lot of phishing emails around COVID-19 / the coronavirus. It's disappointing but expected that cybercriminals know that we are looking for information and answers to guide us through the confusion, anxiety, and uncertainty of what to do next. Be careful not to become a victim of these honed phishing campaigns around some "COVID-19 update" or "current coronavirus news". The last thing a small business needs right now is to lose files or financials to these kind of people, so here are a few quick tips. 

    1) Be especially wary of emails pretending to be from the CDC, WHO, or other government agencies. Try and find the information by searching for it on their website rather than clicking links emailed to you. Even links that appear valid according to their text may be hyperlinked to a completely different location when followed.

     2) Keep an eye out for spelling errors and inconsistencies in the subject line and the from line (or domains that don't look legitimate). Read the entire email address to ensure it's coming from the source you think it is. There are cases of cybercriminals pretending to be internal HR members directing staff to click a link to view updated policies, and are instead directed to a malicious website.

     3) Do your homework before donating to a cause. We're at our best when we decide that we will pull together to support each other in trying times, but some will look to take advantage of that instinct.

    ArsTechnica put together a great article that's worth a read as well, I've linked to it here. Or better yet, maybe search "ars technica covid 19 phishing" and start practicing Tip #1 now!

     Stay safe out there, in every way possible.

    4 Cybersecurity KPIs that Matter to CEOs

    Cybersecurity KPIs

    You know how your business is performing – probably. You know your business’ KPIs and how to read them: analyzing sales reports, profit and loss statements, and financial and operational ratios.

    Cyber-Risk Monitoring: Aligning Cybersecurity with the Business

    cyber-risk monitoring

    With the kind of budgets that companies allocate for IT, they expect high outputs from it. Cybersecurity is one of the most basic requests from their technology teams. Ironically, essential cybersecurity checks seem to miss in most IT plans, while companies try to capture too much from technology.

    How Cybersecurity Has Transitioned

    Reviewing Cybersecurity

    It’s October, and it’s National Cybersecurity Awareness Month.

    Workplace Tips to Protect Against Phishing

    Phish Hook

    In January 2019, the Edmonton Economic Development Corporation reported losing $375,000 in a “targeted fraudulent financial transaction.”  And in 2017, MacEwan University was tricked into transferring $11.8 million to a targeted scam.

    What did these two scams have in common? They used phishing techniques to trick employees into handing over substantial amounts of cash to what they thought was a legitimate recipient. 

    But there are almost always warning signs – and we thought it would be helpful to share some tips to reduce the chance that your business finds itself “on the hook.”

    How to Reduce Business Costs with Managed IT Services

    Saving Money

    Most businesses have the goal of generating profitable revenue growth, and dedicate much of their time and focus to this endeavour. However, it is equally important to focus on controlling costs – without constant vigilance, companies will find themselves struggling to compete under the weight of unnecessary overhead.

    And when you consider how central technology is to today’s business operations, IT becomes a much bigger expense than initially anticipated. So why would a business want to take on a new expense by hiring a Managed Service Provider? Because it’s one of the business decisions that can actually save you more than you spend.

    Six Tips to Speed Up your Office Wi-Fi

    Office Wifi

    With more workers using mobile hardware such as laptops, tablets and mobile phones, Wi-Fi is becoming the default network connection in many workplaces. While it can’t match a wired network for speed and security, the ease of access and flexibility are often worth the trade-off.

    But slow connections, unwanted traffic, weak signals, and old technology can all contribute to a frustrating network experience – and start impacting the flow of information and employee performance.

    We’ve compiled six tips that can help your business speed up your Wi-Fi network and increase security to boot:

    AI and Data Protection in 2019

    AI Robot Chess

    The amount of personal and business data being uploaded into the digital universe continues to expand at a sta­ggering rate; a recent study by IDC estimated that the total amount of digital data will reach 40 ZB by 2020.

    What is a zettabyte? If a kilobyte (kB) is nominally 1000 bytes, a zettabyte is 1 000 000 000 000 000 000 000 bytes. Or 10007 bytes. Or 1021 bytes. You get the idea. Either way you look at it, that’s a lot of cat pictures on Instagram, and a lot of critical data that will needs protection.

    With new privacy regulations, increasingly complex cyberattacks, and the adoption of cloud-based disaster recover strategies, we can expect to see some big changes in how we approach data protection in 2019.

    Have you Reconsidered Cybersecurity for your Small Business?

    Cybersecurity Hacker

    Organizations often believe their data is safe, but frequently are unaware of potential vulnerabilities that can leave them open to attacks. And recent studies reveal wildly differing views between executives and IT professionals in organizations on the effectiveness of their cybersecurity practices and policies.

    Is now the time to re-examine how well your organization is protected against a cyberattack? It may just help you avoid the considerable financial consequences of losing data, time, clients, and your reputation.

    Does your Law Firm have a Data Breach Response Plan in Place?

    lawyer cyber security

    Law firms are known for storing private and important documents for their clients, so it makes sense that they should be properly equipped in case of a data breach.