It’s crucially important to enable two-factor authentication in Zimbra. But if you use IMAP, or if your device or client simply doesn’t support two-factor authentication, you’ll need to make a small change to your two-step authentication settings in order to make them work–and prevent your device from being blocked for failed authorization attempts: You need…
Author: Robbie Ferguson
What is two-factor authentication, and how do I set it up on Zimbra?
In this short (8 minute) video, I’ll teach you two important things: What two-factor authentication is (why it is critical, and why it’s not as complicated as it sounds), How to enable two-factor authentication on your Zimbra account. Important Note: If you use your smartphone or IMAP to check your Zimbra account email, or your…
Episode 8: Cybersecurity Safety in a Work From Home Environment
Podcast: Play in new window | Download
With the COVID-19 pandemic forcing many of us to work from home, this means tapping into technologies that allow us to remotely connect to our office, or otherwise access business resources from a remote location. This could in turn provide criminal hackers that same access. It is a particular danger for small businesses where their…
Making Work From Home Safe for Small Businesses Affected by COVID-19
We’re not all equipped to work from home, but that’s what many of us have been instructed to do. Big companies have resources that smaller companies just don’t have access to. But how do you setup a safe and functional work from home environment for you and your staff? At Positive E Solutions Inc., we…
Episode 7: The Biggest Threats to Your Company in 2020: Is Antivirus Obsolete?
Podcast: Play in new window | Download
As 2020 settles in, Robbie visited Raf Bivar at ESET Canada’s head office in Toronto, Ontario to discuss the evolution of cyber threats, what we can expect in the year to come, and what it takes to truly protect ourselves from the ever-evolving threats to our companies. Robbie FergusonRobbie Ferguson is the host of the Endpoint…
Episode 6: The Ripple Effect of Attacks on the Managed Service Provider
Podcast: Play in new window | Download
It’s a new world when a single attack can affect hundreds of thousands of businesses. Software, services, and core components of your business have been progressively migrating to the cloud; the Managed Service Provider. Have we become complacent by thinking they’re too big to be compromized? Robbie Ferguson takes us on a tour of the…
The Secure Connection Trap: Why Emailing Your Credit Card Number Without Encryption is Never Safe
A surefire way to make tech-savvy people shudder is to email them your credit card number to pay a bill. It’s not that they don’t appreciate the transfer of funds to their account, but they understand that with email, you’re not just sending it to them. Any number of people in between (or computers, called…
Episode 5: Pulling Down the Silos: Protecting Your Company from Cyber Threats
Podcast: Play in new window | Download
The relationships between departments have evolved immensely over recent years–and they must, thanks in part to the current cybersecurity landscape and new data privacy regulations. The difference is especially apparent when reviewing the old silo mentality that segregated the IT Department from the C-Level, forcing data security decisions to fall squarely on the computer support…
Positive E Solutions Inc. Named ESET “MVP Partner Of The Year”
It is with great appreciation to both our on-site team here at Positive E Solutions Inc., and to the team at ESET Canada that we announce that we have been honored as ESET’s MVP Partner Of The Year. This is our second time receiving this award, and to us it represents a mutual appreciation between…
Episode 4: The Security of Things: Effects of IoT and IIoT on Business Security
Podcast: Play in new window | Download
The Internet of Things and the Industrial Internet of Things are huge markets that are growing rapidly as the technology progresses at a rapid pace. Robbie Ferguson welcomes back cybersecurity expert Tony Anscombe to discuss IIoT’s impact on business security. We’ll cover topics such as: Defining the distinctions between IoT and IIoT. How IoT sensors…