Month: February 2017

Internet security breaches occur continuously, but most don’t have effects as far-reaching as those of the so-called Cloudbleed disaster. A Google researcher recently discovered a vulnerability in the code used by Cloudflare, which is one of the biggest Internet security firms in the world. Although the flaw in their code was tiny, it allowed for

Is It Worth it to Switch Your Data? The cloud is all over the place, but that doesn’t mean every business has jumped onboard. Find out whether or not it’s worth it to your move your data, and who you should consider trusting if you do.   If you still see virtual data floating around

Initially hailed as the “SMS of the Internet,” Twitter has evolved into an important marketing tool that small businesses can use to connect to their customers. When Twitter launched almost 11 years ago, many people hailed it as the “SMS of the Internet” due to its short maximum message size and the ease with which

Broadcasting your password on national television may be the easiest way to invite hackers, but common password mistakes make it almost as easy for your data security to be compromised. Password safety may not be one of the most interesting topics in the realm of cybersecurity, but having a strong password is one of the

Calgary IT Provider Recognized for service excellence and best practice by online industry publication. CTECH Consulting Group Inc. is thrilled to announce that they have been named to the VARCoach Top 50 Best Managed IT Companies list. VARCoach is a leading online blog that helps professionals in the managed-service industry collaborate with each other, optimize

Think you’ve got your email solutions all figured out? See why you may be leaving money (and time) on the table if you haven’t considered a cloud email solution. With the amount of discussion on the topic, few people want to think about the best way to receive and send an email. Switching to a

The recent Morton School District hack is a reminder that everyone is at risk from cyber attacks, and provides valuable insight into how to bolster security. As computer systems become embedded in every aspect of our lives, no one is safe from cyber attacks. Public schools are particularly vulnerable, as they store sensitive data on

Consider implementing multifactor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multifactor authentication for your account.

Businesses who utilize connected cars as part of their everyday operations need to educate themselves about the risks to their information and their employees from cyber criminals targeting automobiles. Modern cars are becoming increasingly connected to the world around them; today, many models come equipped with Wi-Fi, Bluetooth, OBD-II, USB, 4G and a variety of

The number of security issues and malware risks that your company must contend with continues to grow every year, but one of the most potentially devastating threats that your business faces is surprisingly low-tech in nature. Spoofed emails don’t rely on complex ransomware or sophisticated keystroke loggers. Instead, your company’s bank account and sensitive information