Catharsis Managed ITโ€™s Blog

Tips, news, and insights from the IT industry

Security

Best Practices to Control Your Access Control

Over time, your business will accumulate a lot of data, including some that certain employees or departments will have no need to see (or perhaps shouldnโ€™t see). An effective way of keeping eyes from wandering is through an access management policy. Letโ€™s go over a few elements you ought to prioritize in your approach to

Read More ยป
Security

Tip of the Week: 3 Key Factors to Securing Your Data

With data being such a valuable asset today (especially personally identifiable data), you canโ€™t afford to let any of the information your company has access to fall into the wrong hands. The same goes for all of your data, especially that which concerns your employees or your clients. Letโ€™s go over a few tips that

Read More ยป
Security

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often donโ€™t use secure passwords. Password managers make this a lot easier, but itโ€™s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important

Read More ยป
Security

Two-Factor Authentication Works to Remove Security Risks

Imagine a scenario where your password has been stolen by a hacker. Now your accounts are completely at the mercy of them. What do you do? Obviously you want to change the password, but are you going to learn from this mistake or let it happen again in the future? Thankfully, two-factor authentication offers a

Read More ยป
Security

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe. Pay Attention to What You Agree To When you install an application or

Read More ยป
Security

Taking a Trip Through Data Privacy, Part I

Protecting your businessโ€™ data is no simple task. To make it as secure as possible, youโ€™ll have to understand how personal data flows through online channels. Weโ€™re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook

Read More ยป
Security

Scam Claims to Have Compromising Videoโ€ฆ of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising positionโ€ฆ or so they claim in a recent scam. For a bit of background, it is important to

Read More ยป
Technology

Technology Basics: Encryption

Secrets need to be protected. Thatโ€™s why humans created cryptography. Cryptography can be traced back to around the time the pharaohs ruled Egypt, but todayโ€™s cryptography is a lot different than simple hieroglyph replacement. Cryptography used in the computing systems today is called encryption. For this weekโ€™s tech term we will look back at the

Read More ยป
IT Blog

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Toronto small businesses that only do business locally are at risk of these issues. Personal email accounts

Read More ยป
Categories
Archives
Scroll to Top
Get a FREE IT Consultation
  • This field is for validation purposes and should be left unchanged.