Kaytie Loucks

Corporate Data Breach Response Checklist

The thought of experiencing a corporate data breach will make any business leader and IT professional shiver. The consequences of losing valuable data, such as your employees’ personally identifiable information, can upend your business entirely if you aren’t prepared to mitigate the breach quickly and effectively. And, unfortunately, these events are happening more frequently than …

Corporate Data Breach Response Checklist Read More »

Solving the Outsourced versus In-House IT Debate

These days, every business uses IT on some level. Subsequently, there are two ways that small-to-medium businesses (SMBs) handle the management of their IT resources⁠—either through in-house support, which involves hiring a single IT specialist or a small team to work internally, or through outsourcing to a Managed Services Provider (MSP). MSPs work externally to …

Solving the Outsourced versus In-House IT Debate Read More »

Does Your Business Have Data Security Locked Down?

As any business leader knows, digital transformation has been a predominantly positive force in the global economy over the last decade. We’ve seen entire industries born online and widespread change across traditional industries. Despite this, the digital age poses several massive security risks for businesses—data breaches, malware and identity theft being among the top issues …

Does Your Business Have Data Security Locked Down? Read More »

Latest Phishing Scam Spoofs Mandatory Office365 Two-Factor Authentication

You’ve likely heard that using Two Factor Authentication (TFA) is the best way to secure your data and accounts online. The process involves authenticating your identity through a second offline channel, either via text message or authentication app. And with 90 per cent of IT departments implementing two-factor authentication for access to cloud applications including Office …

Latest Phishing Scam Spoofs Mandatory Office365 Two-Factor Authentication Read More »

Scroll to Top