passwords

TECHTIP#2 : How to find good passwords?

Passwords are essential. Indeed, it’s important to protect your network, all its data and your business and/or family. It should meet complex rules to avoid cyberattacks.  DOs and DON’Ts to keep your data and accounts safe: DO NOT use a set of same characters/numbers or adjacent on your keyboard: hhhh, 4444, qwerty, 5678. DON’T get inspired by the top 10 passwords of all time (according to Symantec) are: 1. 123456 2. …

cyberattacks

TECHTIP#1: Stay safe from cyberattacks

8 behaviors to avoid to stay safe from cyberattacks: Clicking a phishy email Clicking a “cute cats” link on social media that introduce malware Not updating your software and never get the latest security patches Uploading list of social security numbers to Dropbox Using an unmanaged personal device to access company cloud applications Keeping important data on your computer and not on server (servers are usually backed up daily and …

ransomwares

Computing threat in 2017: ransomwares

In the beginning of 2016, a ransomware attack locked computers’ data of the Ottawa’s hospital. To recover the data, the hospital was forced to pay $17.000 US in bitcoins. Not only big organizations are attacked by ransomwares. Indeed, for several years, beginner hackers can easily download virus packs like Trojan Horses, and target individuals, and small & medium sized organizations to infect. In the first quarter of 2016, victims paid more …

disaster recovery

Why disaster recovery is important?

Since a long time, Disaster recovery was neglected but the situation today has changed. Everyone till date has experienced the data loss at least once. It is important to learn the importance of Disaster recovery in order to avoid losses that could have a negative impact on your business. 40% of businesses don’t reopen after a major disaster, such as a fire or a flood. But with a good disaster …

data protection

Security and data protection

It is a well-known fact that the security of the cloud infrastructure is perceived as both an advantage and a challenge today. According to IT professionals marketing, in a survey of 300 companies which employee more than 100 employees – 64% of the companies consider cloud to be a more secure alternative to legacy systems.  The level of enterprise who trust cloud security is encouraging but it is not that simple. The myth that the Cloud is less secure is rooted in …