Blogs
Categories
- 8 tips
- alberta
- audit
- becyberaware
- british columbia
- business
- Business awareness
- call center
- canada
- Canadian
- canadian business
- chat support
- checklist
- co-managed IT
- common phishing signs
- companies
- company
- company culture
- computer security
- customer support
- Cyber Security
- cyber security analyst
- cyber security companies
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer
- cyber security engineer
- cyber security information
- cyber security news
- cyber security programs
- cyber security threats
- cybercrime
- Cybersecurity
- Cybersecurity defense
- cybersecurity training
- cyersecurity
- data breach
- device scam
- device security
- employee training
- fake emails
- freeupspace
- hackers
- health
- healthcare
- home security
- how to
- Indigenous Owned
- IoT
- kaseya
- kaseya attack
- malware
- managed service provider
- managedIT
- management
- manitoba
- medium size business
- MFA
- Microsoft
- MicrosoftDefender
- mobile
- mobile attacks
- morespace
- MSP
- multi-factor authentication
- new brunswick
- north west territories
- nova scotia
- nunuvut
- online
- online reputation
- ontario
- pei
- phishing
- phishing email
- phone breach
- phone hacked
- prince edward island
- quebec
- ransomware
- ransomware attack
- remote workers
- safe harbor
- Safe Harbour
- safe harbour informatics
- saskachewan
- scams
- sgn
- SLAM
- small business
- smishing
- storage
- two-factor
- typesofhackers
- USA Business
- vpn
- wifi
- windows
- windows10
- yukon
Twitter Deals with Cyber-Attack from Within
Posted by Norma Stratton on

On Wednesday, July 15th, Twitter was faced with the worst security breach they have experienced since their inception, leaving the company scrambling to determine whether their employees were victims of an elaborate scheme or willing participants. So, what exactly happened? Invitations to what appeared to be a Bitcoin scam were tweeted by some of the most influential people in the world, including Bill Gate and Elon Musk. Even former President Barack Obama’s account was involved. Twitter’s response was to prevent any further posts from verified accounts and announce that they had detected a “coordinated social engineering attack by people who...
What Are the Costs to Operate a Magento Store in 2020?
Posted by Norma Stratton on

Have you been considering making the switch to Magento, but not done so because you are unsure of the costs involved? Magento is one of the best choices for online stores, so you might be concerned that it is expensive, but let’s take a look at what you can expect from a Magento launch, as well as what would be involved in running a Magento-based store. Understanding Magento Pricing You may have heard that Magento is one of the most expensive platforms available for your online business. While there is some truth to that, it is probably more correct to...
Greater Cybersecurity in the Time of Rising COVID-19
Posted by Norma Stratton on

To say that 2020 has been a unique and challenging year would be quite an understatement. The events of this year have seen countless businesses shut down, either temporarily or permanently. Workers have either been laid off or at least had hours reduced. In this environment, it is hard to imagine there is a surge in the need for new workers, but in at least one industry that has been the case: cybersecurity. The demand for cybersecurity professionals saw a jump while COVID-19 cases spiked globally. In fact, across the US, demand increased 65%, and a recent report sponsored by...
Moving from Magento V2 to Shopify Plus
Posted by Norma Stratton on

When selecting an E-commerce Platform
Magento and Shopify are among the most popular. What happens when you are not satisfied with your choice? When the health and fitness brand Innermost decided to make the move from Magento to Shopify, they turned to Swanky for assistance. Here’s what they experienced during the change.
Security Risks of Remote Worker Home Networks
Posted by Safe Harbour Informatics Admin on

Cyber Security Tips for Employees Working from Home
Flexible scheduling and work-from-home opportunities are increasingly attractive options to many employees. But the COVID-19 pandemic and resulting lock-down has thrust the entire workforce into a remote working reality—and unfamiliar territory. With a larger number of the workforce working from home, it is important, now more than ever, to ensure your business data is protected […]