Cybersecurity
Living on Vancouver Island, we’re all used to talking about earthquakes. Many of us have invested in an emergency plan and supplies. But what about our businesses? Every business should have a Business Continuity and Disaster Recovery (BCDR) plan. It does not need to be elaborate. It needs to cover Recovery Point Objectives (RPO), Recovery…
Read MoreAn email phishing scam that exploited Microsoft Office 365 has recently come to our attention. Last week, a local bookkeeper’s email account was hacked. Here’s the timeline and a summary of events: On Friday, the bookkeeper received an email from someone that she was expecting a message from. She thought it looked fishy, so she replied to…
Read MoreThis Saturday, March 31st is World Backup Day. Is your small business prepared? A simple backup is no longer sufficient to support your business when disaster strikes. Weather disasters, fires, power outages and human error can all result in data loss. Data backup is one of the most common examples of risk oversight in businesses…
Read MoreRecent threats have surfaced known as ‘Spectre’ and ‘Meltdown.’ These vulnerabilities could exploit modern processors. We wanted to take a moment to share some important details of these vulnerabilities so that you can ensure that your business is not at risk. Spectre and Meltdown are the names given to different variants of the same vulnerability.…
Read MoreWhat is the difference between Traditional vs. Intelligent Data Backup? Most businesses today are still using a traditional data backup solution. Unfortunately, these older data backup solutions are no longer sufficient. We have come up with this list to highlight some of the key differences between traditional and intelligent backups. #1 Recovery Time In…
Read MoreI love being proactive. Identifying and dealing with risk before disaster strikes is a huge part of my everyday job at Smart Dolphins. My routine risk management work is mostly technical. I ensure routers are secure, backups are working and security policies are in place. Being proactive with machines is a process. It can be…
Read MoreDid you know that computer users are still the weakest link in information security? Because email phishing attacks can have a direct financial impact on your business or organization, ensuring that your users have some basic cybersecurity training, is essential. Email phishing attempts are getting trickier to catch. Sometimes these emails are really, really easy…
Read MoreWannaCry is a new ransomware that uses links to execute code which infects the local computer. You’ll receive an email that looks legitimate, but has a link to malware instead. Once this ransomware has infected a computer on the network, it will attempt to spread to other computers. We would like to remind every computer…
Read MoreRansomware is generally defined as malicious software that infects your computer and denies you access to your computer or files until you pay a ransom. Millions of ransomware infections are reported every year. Organizations today, require a multifaceted IT security program that is regularly evaluated and re-adjusted. The Challenge Smart Dolphins manages the IT networks…
Read MoreIt’s October, cybersecurity awareness month so we thought we would share a simple security tip. Facebook accounts get hacked everyday. Secure your Facebook with Two-factor authentication. Here’s how to enable Facebook’s built-in authenticator: Login and click on account settings Select security Edit login approvals Select require a security code to access…
Read More