(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

OnSite I.T. has been serving the Alberta area since , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Phishing is Still Getting More Sophisticated

Phishing is Still Getting More Sophisticated

Phishing attacks are nothing new in the business world, and they will almost certainly become more prevalent as time passes. Unfortunately, phishing attacks have adapted their practices to get around advancements in security technology, so businesses must work extra hard to spread awareness of phishing to their employees and train them appropriately.

0 Comments
Continue reading

Ransomware Is Really Scary, Even If You Don’t Have Ransomware

Ransomware Is Really Scary, Even If You Don’t Have Ransomware

If you look at all of the security-related headlines from the past year, what do you think the biggest trend is? Perhaps it was the plethora of large-scale ransomware campaigns that struck both individuals and businesses in spades. Even now, ransomware continues to make headlines by changing its tactics, with one of the more recent ones being in regards to fake ransomware.

0 Comments
Continue reading

WARNING: Log4j is a Serious Threat, and Your Business Needs to Act NOW

WARNING: Log4j is a Serious Threat, and Your Business Needs to Act NOW

Log4j is a major vulnerability that has a widespread impact across a wide range of technology. We can’t stress how serious this is, and your business needs to take action right away.

0 Comments
Continue reading

Utilizing Open Source Software Can (Sometimes) Be Problematic

Utilizing Open Source Software Can (Sometimes) Be Problematic

When it comes to software solutions, many companies don’t have as much freedom as they might like to pick and choose the highest quality solutions available. Some companies might even opt to take advantage of free, open-source software simply because it is the best option that fits their price point. While there are benefits to open-source software, we want to encourage all users to also consider the dangers involved with using it.

0 Comments
Continue reading

You Can’t Take Your Network’s Security for Granted

You Can’t Take Your Network’s Security for Granted

It’s easy to see the headlines and think that a major data breach cannot happen to your business, but this is a dangerous mindset to hold. If you aren’t taking cybersecurity seriously these days, then you’re making a huge mistake. You need to implement security measures now before it’s too late.

0 Comments
Continue reading

Phishing Email Subject Lines You Should Know

Phishing Email Subject Lines You Should Know

Even the best employees will encounter situations where they might accidentally put your organization at risk due to a phishing attack. What are some of the telltale signs of a phishing scam and how can you tell when you need to be cautious? The subject lines of phishing emails can be indicative of their threat level. Let’s take a look.

0 Comments
Continue reading

Law Firms Need to Do More to Protect Their Data

Law Firms Need to Do More to Protect Their Data

In certain industries that are steeped in tradition, it can often be challenging to meet the stringent security requirements in order to keep up with modern threats. Take, for example, the modern law firm. Just how does a law firm go about securing its data and technology, and what must be considered when implementing security solutions for these types of organizations?

0 Comments
Continue reading

What You Should Know About Voice-Based Tool Security

What You Should Know About Voice-Based Tool Security

With so many workers performing tasks remotely, it’s no small wonder that authentication is one of the major points of discussion this year. How can you be sure that your company is doing all it can to verify a user’s identity before they access important information on your infrastructure? One such way you can do it is by using voice-based authentication.

0 Comments
Continue reading

What Is Your Business’ Information Worth to a Scammer?

What Is Your Business’ Information Worth to a Scammer?

Believe it or not, someone can actually purchase access to your organization’s network under the right circumstances. This is the unfortunate reality that we live in, where the commoditization of data and network access has become a real problem. According to a study from KELA, hackers can sell access to compromised networks for a pittance compared to the amount of work you have invested in building your business. Therefore, you must do everything in your power to protect your network and prevent this from happening.

0 Comments
Continue reading

Meet the Firewall: The Unsung Hero of Your Network’s Security

Meet the Firewall: The Unsung Hero of Your Network’s Security

The term firewall is not a new one, and it’s not as old of a term as you might think. Before it became commonplace in the computing environment, it was first introduced to the world in 1983 when it was used in a movie titled WarGames. Nowadays, it is used mostly in regard to network security. Let’s take a look at what a firewall does and what the different types of firewalls do.

0 Comments
Continue reading

What Does it Mean To Go Passwordless? Just Ask Microsoft

What Does it Mean To Go Passwordless? Just Ask Microsoft

Passwords have long been a staple against security threats, but the password could soon be a thing of the past. Microsoft is advancing toward this new concept, but what does it mean for your business? Let’s take a look and see what going “passwordless” can mean for an account’s security.

0 Comments
Continue reading

Four Steps to Make Cybersecurity Training as Effective as Possible

Four Steps to Make Cybersecurity Training as Effective as Possible

Real cybersecurity preparedness is, like most things in a business, a team effort. Everyone needs to be aware of the best practices involved in cybersecurity. Naturally, this will involve training. In the interest of making sure this training is as effective as it needs to be, we’ve assembled a few best practices to keep in mind as you design a curriculum.

0 Comments
Continue reading

Using Windows Hello to Add Security

Using Windows Hello to Add Security

Authentication is a tricky thing for businesses. While people want to be secure, they also want to make that security as convenient as possible. Developments involving solutions like Windows Hello, a biometrics authentication system used by Microsoft, have been pushing this trend forward. Let’s take a look at Windows Hello and see what kinds of authentication features it brings to the table.

0 Comments
Continue reading

A Rant About Why It’s Important to Lock Your Computer

A Rant About Why It’s Important to Lock Your Computer

When it comes to network security, there is a lot that can go wrong for your business and countless solutions that you can implement to combat them. However, there are small practices that you can implement on a daily basis to improve security as a whole, so if your collective staff can implement this one easy trick, you might be surprised by how beneficial it can be for your network’s security. This practice? Locking your computer.

0 Comments
Continue reading

LinkedIn Users Exposed on Hacker Forums

LinkedIn Users Exposed on Hacker Forums

With every new day comes a new data breach that exposes the personal data of countless people. The most recent in this troubling trend is the LinkedIn data breach, an event that exposed 700 million profiles and led them to be put on sale on a hackers forum. LinkedIn denies the data breach, but how much truth is in this statement? Let’s take a closer look.

0 Comments
Continue reading

Turns Out Paying Ransomware Hackers Is a Bad Idea After All

Turns Out Paying Ransomware Hackers Is a Bad Idea After All

Ransomware has taken over the security industry, as we are sure you have seen from the endless headlines associated with it. All business owners must remain cognizant of the dangers that ransomware represents. A new study has found that organizations infected by ransomware that wind up paying the ransom are not necessarily better off--in fact, paying the ransom could have disastrous consequences.

0 Comments
Continue reading

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

Major cyberattacks seem a dime a dozen these days, especially with businesses that might not seem like possible targets. For example, McDonald’s restaurants recently suffered a data breach. Let’s take a look at the situation, how it played out, and what we can learn from it.

0 Comments
Continue reading

Phishing Attacks in 2021 Trend Toward the COVID-19 Pandemic

Phishing Attacks in 2021 Trend Toward the COVID-19 Pandemic

Hackers have made some nefarious choices over the past several months, many of which involve using the COVID-19 pandemic to spread their influence and steal data through the use of phishing attacks. Let’s explore how these cybercriminals have leveraged a global disaster to their benefit and some ways that you can keep your business secure.

0 Comments
Continue reading

Privacy Engineering Holds the Key to Future Data Privacy Decisions

Privacy Engineering Holds the Key to Future Data Privacy Decisions

Data privacy is central to most conversations in the business environment, and in a time when ransomware and hacks of all kinds are constantly receiving media presence, it’s no surprise that it is sensationalized to a certain extent. That said, it’s critical for businesses to understand what needs to be done to future-proof their data privacy infrastructures.

0 Comments
Continue reading

Setting Up Authentication on Many Popular Platforms

Setting Up Authentication on Many Popular Platforms

Many businesses have chosen to take advantage of two-factor authentication for their security needs, but there are far too many that have chosen not to. The methods might vary from organization to organization, but the general principle remains the same. We’re here to share with you how to implement two-factor authentication for three common business accounts: Microsoft, Google, and Apple.

0 Comments
Continue reading