Cyber Insurance...is it for you?
Posted by Deb Cashion
on 4 May 2023
![Cyber Insurance...is it for you? Cyber Insurance...is it for you?](https://assets.cdn.thewebconsole.com/S3WEB6522/blogImages/6450490b16ade.jpg?v=2&geometry(550>))
You may have heard about cyber insurance but may not fully understand what it is or if your business needs it. With the increasing number of cyber-attacks on businesses and recommended changes in The Privacy Act, it is important to consider investing in cyber insurance. This type of insurance policy is designed to protect businesses from the damage and fallout from cyber-attacks and hacking - such as financial losses, reputational damage, and the loss of sensitive business and customer inform...
Posted in:MiscSecurityCyber Security |
Windows 11 – Is it time to upgrade?
Posted by Deb Cashion
on 27 April 2023
![Windows 11 – Is it time to upgrade? Windows 11 – Is it time to upgrade?](https://assets.cdn.thewebconsole.com/S3WEB6522/blogImages/6445cb7aeead8.jpg?v=2&geometry(550>))
As technology continues to advance, keeping up with the latest updates and upgrades is essential for businesses to remain competitive and efficient. One such upgrade that businesses should consider is moving from Windows 10 to Windows 11. In this blog, we will explore the benefits of upgrading to Windows 11 and what you can expect from this new operating system.
Pros of Upgrading to Windows 11:
Enhanced User Experience: Windows 11 offers a modern and clean interface that is visually...
Posted in:WindowsWindows Update |
Loyal I.T. Solutions Five Recommended Authenticator Applications or Hardware
Posted by Deb Cashion
on 20 April 2023
![Loyal I.T. Solutions Five Recommended Authenticator Applications or Hardware Loyal I.T. Solutions Five Recommended Authenticator Applications or Hardware](https://assets.cdn.thewebconsole.com/S3WEB6522/blogImages/643dd20b27199.jpg?v=2&geometry(550>))
Authentication and password security is part of the Essential Eight of Cyber Security and it is strongly advised for your network security. Using an authentication application is also evidence of compliance for insurance policies and investigations.
In the past Loyal I.T. Solutions has strongly urged all their clients to implement two factor (2FA) or multi-factor (MFA) authentication. Our recommendation is to have two forms of authentication – one, a one-time passcode (OTP) via...
Posted in:SecurityCyber SecurityApplications |
MailGuard Email Security
Posted by Deb Cashion
on 4 April 2023
![MailGuard Email Security MailGuard Email Security](https://assets.cdn.thewebconsole.com/S3WEB6522/blogImages/642b6b3179842.jpg?v=2&geometry(550>))
We have recently seen a marked increase in the attempted hacking of email accounts which might include methods such as phishing, spear phishing, spoofing and other forms of Malware (see our Cyber Security Terminology blog for more information on these terms).
Installing a mail protection system that uses policy-based rules to detect threats and enforce compliance, accountability and brand protection is recommended by security experts. Loyal I.T. Solutions uses and recommends Mai...
Posted in:SecurityCyber SecurityEmail |
Microsoft Azure Active Directory Security Defaults
Posted by Deb Cashion
on 27 March 2023
![Microsoft Azure Active Directory Security Defaults Microsoft Azure Active Directory Security Defaults](https://assets.cdn.thewebconsole.com/S3WEB6522/blogImages/641d065c33501.jpg?v=2&geometry(550>))
Background
In May 2022, Microsoft announced that it will be automatically enforcing more secure default settings, known as "security defaults" on all existing Microsoft 365 (Azure AD) tenants. Although clients who came on board with the Microsoft portal after October 2019 are already protected, Microsoft is running a campaign to move all users to multi factor authentication (MFA) when logging into the portal. They are currently sending notifications via ...
Posted in:MiscSecurityCyber Security |
Cyber Security Terminology
Posted by Deb Cashion
on 15 March 2023
![Cyber Security Terminology Cyber Security Terminology](https://assets.cdn.thewebconsole.com/S3WEB6522/blogImages/641159c315704.png?v=2&geometry(550>))
Cyber security is a concern for all technology users, and hackers and scammers are finding new ways to scam and hack consumers and businesses. Sometimes the terminology can be hard to understand, so this blog is designed to give you the plain English definition of current hacking and scamming terms.
Baiting - A type of social engineering attack where a scammer uses a false promise to lure a victim into a trap which may steal personal and financial information or inflict the system wi...
Posted in:SecurityNetworking SecurityCyber Security |