Stephanie Edwards
Bio
Stories (33/0)
Six Most Overlooked Devices to Protect in Your Office
Many companies across the world are investing in better cybersecurity. They’re securing computers and email, choosing secure software, and backing up data to the cloud. There is, however, one area that’s often overlooked in cybersecurity: Internet-of-Things (IoT) devices.
By Stephanie Edwards11 months ago in 01
Why Your Business Needs Cybersecurity Insurance
Preventing cyber-crime is one of our top priorities – and for good reason: the threat level is higher than ever. In 2020, Data breaches exposed 36 billion records in the first half of 2020. While partnering with a Managed Services Provider can help provide cybersecurity, no network should ever be assumed 100% secure. Cybersecurity insurance is an important part of any business continuity plan. Cybersecurity insurance offers protection against potential claims resulting from a data breach. It also offers protection against financial loss, as well as business interruption coverage. Read on to learn more about cybersecurity insurance- and why your business needs to have it.
By Stephanie Edwards11 months ago in 01
Four Rules for a Robust Password Policy
A password policy is a simple way to enhance your company’s security. When implemented correctly, a password policy makes it much more difficult for 3rd parties to compromise accounts. A password policy, therefore, lowers the chance that your company might experience a breach. Most modern systems that facilitate authentication can be configured to enforce a password policy.
By Stephanie Edwards2 years ago in Journal
Office 365’s Backup Misconception
Here’s the problem. Microsoft has incredible Data Centers with loads of horsepower and built-in redundancies to protect your real-time information. With features like redundant storage arrays, highly available connectivity, backup generators, and exceptional security, your data is stored in one of the safest locations on the planet. That said, you should be aware that Microsoft does not guarantee data retrieval.
By Stephanie Edwards2 years ago in 01
Minimum Requirements for Cybersecurity Insurance
The world is changing. There was a time when cybersecurity insurance was easy to obtain. With insured cyber losses of $1.8 billion in 2019 (Hiscox) and cyber incidents growing rapidly, insurance companies are now introducing minimum requirements for businesses. Read on to learn what may be required before they will approve you.
By Stephanie Edwards2 years ago in Journal
Why Your Business Needs Microsoft Defender for Office 365
What is Microsoft Defender for Office 365? If you’ve been looking into cybersecurity for your business, you probably know about the risks associated with phishing, malware, and other virtual threats. There are many ways to protect your organization from these threats, including teaching staff to recognize phishing emails and installing anti-virus, anti-malware, and anti-ransomware protection. At the end of the day, however, effective cybersecurity requires a multi-layered approach. Staff are typically the highest risk to your business.
By Stephanie Edwards2 years ago in 01
The Hidden Costs Behind Data Breaches
Data is one of the most valuable assets in today’s world. Today’s digital giants- such as Microsoft, Google, and Facebook- command incredible amounts of data. Despite their size, however, even they deal with security incidents. Breaches are a huge threat to any organization, with the average cost of a data breach being $3.86 million (Varonis).
By Stephanie Edwards2 years ago in Journal
Why You Need Cybersecurity
Cybersecurity is a hot topic for businesses in the modern age. Everyone is talking about it, and yet, many businesses lack sufficient protection. It’s often overlooked because they feel their business is not a target and they’re safe. Until a major incident takes place, it isn’t a priority. Did you know that 21% of the overall Canadian business population reported cybersecurity incidents in 2019? Or that Canadian small businesses suffering a breach were down for an average of 59 hours at a cost of 1.1 million in 2018 (GamTech)? Hackers target the vulnerable, they rarely discriminate. Read on to find out more.
By Stephanie Edwards2 years ago in 01
What to Look for in an IT Company
So, you’re searching for an IT company – specifically, a managed services provider. Perhaps you’ve struggled with downtime. Perhaps you have outgrown your existing tech expert. Or perhaps you recently suffered a data breach- which, at an average downtime of 59 hours and a cost of 1.1 Million (Varonis and IBC), is a huge loss. Either way, you’ve decided it’s time to find an IT company to look after your technology.
By Stephanie Edwards2 years ago in 01
What is Multi-Factor Authentication, and Why Is It So Important?
As a team responsible for protecting thousands of users around Canada, we want to make it clear that if you are not already using Multi-Factor Authentication (MFA) to protect your business and yourself, you should make it a priority to implement as soon as possible.
By Stephanie Edwards2 years ago in 01
What to Look for in an IT Company
So, you’re searching for an IT company. Perhaps you’ve had trouble with outages. Perhaps you have finally reached a point where your resident tech expert can’t keep up. Or perhaps you’ve recently suffered a data breach- which can cost your company thousands or even millions. Either way, you’ve decided that it’s time to find an IT company to look after your business.
By Stephanie Edwards3 years ago in 01