It’s crucially important to enable two-factor authentication in Zimbra. But if you use IMAP, or if your device or client simply doesn’t support two-factor authentication, you’ll need to make a small change to your two-step authentication settings in order to make them work–and prevent your device from being blocked for failed authorization attempts: You need…
What is two-factor authentication, and how do I set it up on Zimbra?
In this short (8 minute) video, I’ll teach you two important things: What two-factor authentication is (why it is critical, and why it’s not as complicated as it sounds), How to enable two-factor authentication on your Zimbra account. Important Note: If you use your smartphone or IMAP to check your Zimbra account email, or your…
Episode 8: Cybersecurity Safety in a Work From Home Environment
Podcast: Play in new window | Download
With the COVID-19 pandemic forcing many of us to work from home, this means tapping into technologies that allow us to remotely connect to our office, or otherwise access business resources from a remote location. This could in turn provide criminal hackers that same access. It is a particular danger for small businesses where their…
Making Work From Home Safe for Small Businesses Affected by COVID-19
We’re not all equipped to work from home, but that’s what many of us have been instructed to do. Big companies have resources that smaller companies just don’t have access to. But how do you setup a safe and functional work from home environment for you and your staff? At Positive E Solutions Inc., we…
Episode 7: The Biggest Threats to Your Company in 2020: Is Antivirus Obsolete?
Podcast: Play in new window | Download
As 2020 settles in, Robbie visited Raf Bivar at ESET Canada’s head office in Toronto, Ontario to discuss the evolution of cyber threats, what we can expect in the year to come, and what it takes to truly protect ourselves from the ever-evolving threats to our companies.
A Better Alternative to Turning off the Firewall
It might sound inconceivable to some, but one of the most significant and preventable causes of companies falling victim to cybercrime is when employees themselves circumvent the firewall. Now, why would anyone do that? Picture an accountant, working busily away, trying to get hold of some last-minute data to complete a report that is already…
Episode 6: The Ripple Effect of Attacks on the Managed Service Provider
Podcast: Play in new window | Download
It’s a new world when a single attack can affect hundreds of thousands of businesses. Software, services, and core components of your business have been progressively migrating to the cloud; the Managed Service Provider. Have we become complacent by thinking they’re too big to be compromized? Robbie Ferguson takes us on a tour of the…
The Secure Connection Trap: Why Emailing Your Credit Card Number Without Encryption is Never Safe
A surefire way to make tech-savvy people shudder is to email them your credit card number to pay a bill. It’s not that they don’t appreciate the transfer of funds to their account, but they understand that with email, you’re not just sending it to them. Any number of people in between (or computers, called…
Data Breaches Can Haunt Firms For Years
The compromised company may bear the financial brunt of the breach within the first year after the incident occurs, but the price tag is still far from final. The average cost of a data breach has risen 12% over the past five years to US$3.92 million globally, according to IBM’s 2019 Cost of a Data Breach study, which…
Episode 5: Pulling Down the Silos: Protecting Your Company from Cyber Threats
Podcast: Play in new window | Download
The relationships between departments have evolved immensely over recent years–and they must, thanks in part to the current cybersecurity landscape and new data privacy regulations. The difference is especially apparent when reviewing the old silo mentality that segregated the IT Department from the C-Level, forcing data security decisions to fall squarely on the computer support…