Ekota Central’s Cybersecurity Experts Share Tips With Edmonton Examiner

Ekota Central’s Cybersecurity Experts Share Tips With Edmonton Examiner

Keeping your personal data safe and secure while maintaining an online presence can be tricky without a little expert guidance.

The recent rash of high-profile data security breaches impacting customers of companies like Uber and Equifax have shined a spotlight on digital privacy concerns. Businesses and individuals alike are growing more aware of the risks to their sensitive information in an online world, worrying that they could be among the next round of victims.
Taking steps to protect yourself from cyber threats both at home and at the office has never been more important. As these threats continue to become more sophisticated, users need to be aware of the impact their behaviour can have on their online security. Protecting yourself and your personal data is equal parts security safeguards and smart Internet use habits.
The Edmonton Examiner recently reached out to the team of cybersecurity experts at Ekota Central for an interview and spoke with Jae Steen and Shawn Ayotte, who shared some great security tips with Examiner readers. Take a few minutes to check out the original article on the Examiner’s website, and see what they had to say.
Over Sharing Is The Biggest Danger To Your Personal Data
It goes without saying that cybersecurity safeguards like firewalls, spam filters, and antivirus software are necessary precautions for you to have in place whenever you find yourself online. Especially when you online activities include your banking or credit card information, or any other piece of information that could be used to steal your identity.
Aside from the need to be sure that the websites you’re visiting are legitimate and the connection you’re using is secure, you need to be smart about password management. Those other safeguards can only protect your personal data if a hacker has no other way of getting their hands on your information. A strong password protects the information stored in the account it’s securing, but protecting that password is up to the user.
This means not just choosing a password that isn’t easy to guess, but avoiding sharing that password with anyone, avoiding writing down your password, and never using the same password for multiple accounts. A secure password manager can make all of this much easier by keeping track of all of your unique passwords for you and offering the added bonus of letting you create complex passwords that you otherwise would have a hard time remembering.
That being said, passwords alone are not enough anymore. Two-Factor Authentication is a growing trend in the business world that is quickly becoming popular for personal cybersecurity as well. Social media sites like Facebook are using Two-Factor Authentication to prevent unauthorized logins by requiring users to provide a second piece of information in addition to their password. Facebook uses a temporary code generator to give users a number they need to provide each time they log into their account, but codes sent via text message are another popular Two-Factor Authentication option. More advanced options use things like biometric data.
A quick look at the security settings of your online accounts will tell you if there is a built-in Two-Factor Authentication option available for you to activate in order to protect your personal data. It’s often possible to use a tool like Google Authenticator to generate a Two-Factor Authentication code that adds an extra layer of security to certain websites and apps that support Two-Factor Authentication.
And while we’re on the topic of social media, it’s more than just your password you need to be concerned about.
Social engineering is a favourite tactic of cybercriminals, and one of the easiest ways for them to steal your identity or gain access to your personal data is by using the information you’ve readily provided to them. You social media profiles contain a ton of information that can be used to power a phishing scam, with disastrous results.
Phishing scams work best when the cybercriminal behind them knows just enough about you and your habits to fake correspondence from the right bank, or pose as a favourite online retailer in order to get passwords or other personal data out of you without raising suspicion. A public social media profile makes getting this type of information much easier than you’d think.
And it’s not just the safety of your personal data you need to be concerned about when it comes to oversharing on social media. Your physical safety can be compromised if the wrong person sees the wrong information. All of those fun vacation photos let a burglar know you’re far from home, making your home an ideal target. Using the location tagging feature on apps like Facebook or Instagram gives real-time information about your location and activities, which can potentially put your personal safety in jeopardy as well.
At the end of the day, cybersecurity comes down to common sense and caution. Listen to the advice offered by cybersecurity professionals, and you can cross worrying about your personal data off of your to-do list.
Want to learn more about the steps you can take to protect yourself and your business against cybercrime? Contact Ekota Central at {email} or {phone} today. We’re the cybersecurity professionals businesses in Edmonton trust.

The Ins and Outs of Cybersecurity

The Ins and Outs of Cybersecurity

Cybersecurity is something many of us are not entirely familiar with. It seems like something we do not need to worry about unless we work in the tech industry, because who ever heard of an individual being targeted on the web? As seemingly unlikely as it may seem there are cyber-attacks issued on individuals every day. This means that not only do large industries such as the banking and healthcare industry need to worry about cyber-attacks, but everyone including the average Joe should be aware of this potential threat. The sad truth is that if you are using the internet you have the potential to be targeted by hackers.

Why Cybersecurity Matters
Cybersecurity is essential in ensuring that private or sensitive information does not fall into the wrong hands. This is becoming increasingly difficult as the number of harmful material- such as malware- that is being launched daily has risen to nearly 230,000 samples. It can be difficult for people to determine what is safe and what is not safe on the internet these days with the rising number of hacking attempts. Already cybersecurity crimes are costing $100 billion dollars a year globally. This number is only expected to increase, and an estimated $1 trillion will be spent on cybersecurity between 2017 and 2021.
When hackers and cyber terrorists are making these attempts, there are usually sinister motives behind them. This is usually an attempt to steal information so that they may be able to commit fraud, harassment, or identity theft. If they are successful in their attempts hackers can do more than ruin your day, it could have lasting effects on you and your company.
Who is Affected by Cyber Crimes
Most of us know that large industries such as government, retail, and tech are at elevated risk for cyber-attacks if they do not take the proper precautions. In fact, 95% of breached records came from these three industries in 2016. This makes sense, as these are industries that hold a lot of information and are profitable, making the information they have desirable to hackers. Furthermore, malware has infected 75% of the healthcare industry over the last year. And since 2013 over 300,000 records have been stolen each day. This makes for an average of 44 records being stolen every second. This is confidential information that both companies and individuals work to keep secure. If these records are stolen it not only has an impact on the company but also on the individual. Because of this, it is important to remember that individuals must be aware of their own cybersecurity as well as that of businesses and companies. Small businesses face the threat of cyberattacks as well. 43% of cyber-attacks are aimed at small businesses, and 64% have experienced some form of web-based attack.
It is important for anyone who uses the internet to be aware of their online presence. There is an attempted cyber-attack every 39 seconds and one in three of these attempts will affect Americans. These attempts are not only aimed at large corporations like banks and government industries, but they can also impact individual internet users. Largely the place cyber-attacks are more likely to occur is on individuals using mobile devices. There was a 31.7% increase in mobile device attacks between 2011 and 2012 and with the increasing number of mobile devices the likeliness of an attack only rises. Currently, it is estimated that there are 25 connected devices- including mobile devices such as phones, tablets and the like- per 100 people in the United States. This number is expected to rise to between 50 to 200 billion devices by 2020. It is important for individuals to protect themselves and their devices from attempted cybercrimes.
How the Cybersecurity Industry is Growing and Why
The Cybersecurity industry is expected to have grown from a $106.3 billion-dollar industry to a $170.2 billion-dollar industry by 2020 in a matter of 5 years. The cause of this growth stems largely from the increased number of attacks being issued each day, and companies and individuals desire to keep their information secure. Currently, there are 209,000 cybersecurity jobs that are open, and more cybersecurity job opportunities are posted every day. By 2019 it is expected that there will be 1.5 million unfilled positions in the cybersecurity industry.
There is an increased demand for cybersecurity that is effective, as in the past it seems as if there has just been numerous attempts at securing companies and individuals online only to have the same headlines about cyber-attacks and their success appear on the news. The cybersecurity industry is growing, and specialists are joining the efforts to prevent cybercrimes every day. With only 38% of individuals claiming that they and their business are prepared in the case of an attempted cyber-attack, it is more important than ever to be aware of cybersecurity measures that can be taken to prevent the loss of valuable information.

Top 12 Tech Gifts of 2017: Microsoft Xbox One X

Top 12 Tech Gifts of 2017: Microsoft Xbox One X

We like tech, it’s what we do. As the holiday shopping season kicks into overdrive, we are bringing you 12 of the most requested, most wanted tech gifts for 2017. Check back each business day between now and December 19th for another must-have tech item and why you should check it out.
If you’re a gamer, especially a console gamer, you’ve no doubt heard of or are watching the Xbox One X. Microsoft has taken its flagship console, the Xbox One, and turned it up a few notches. Sporting 40% more power than any other console on the market and a 6 teraflop GPU (that’s crazy fast), it’s able to produce true 4K visuals.
The new Xbox comes equipped with a 4K Blu-ray disc drive (only console that has this), 4K DVR and 4K streaming, fastest load times of any console on the market, and is compatible with all of your Xbox One games and accessories. The Xbox One X comes with a 1TB hard drive and retails for $499.99 and is in stock at most retailers but you might want to check availability before driving down to your local retailer.
The Xbox One X is an impressive piece of hardware that brings 4K visuals to stunning life. Now you just need that beautiful new 4K TV. (check back next week for more on 4K TVs)
Happy Holidays and good luck on the tech hunt from all of us here at {company}!

8 Reasons Why Smart Business Owners Have Switched to Office 365

8 Reasons Why Smart Business Owners Have Switched to Office 365

When business owners regale the virtues of Office 365, others listen and say, “Well, maybe one day we’ll look into it.” The problem with this kind of thinking is that it puts O365 in a box only reserved for larger companies, and that’s not how the platform is designed to work. Many of the features Microsoft has recently added are beneficial for small businesses that want to grow.

An Upgrade from Traditional Licensing
New, small businesses tend to take a casual approach to licensing, buying individual licenses for their personal/work computers as needed. That’s fine, but only for a while. Eventually purchasing one-at-a-time licenses for the Office Suite or other important software becomes expensive and complex to manage from an administrator’s perspective.
O365 is designed for businesses that have grown beyond a few people, into a staff of employees with multiple desktop computers and mobile devices. When you purchase a package, you’re purchasing services based on the number of users, instead of trying to manage individual licenses, or one-time purchases. This makes it easy to plan for upcoming hires while creating a system that you can manage easily. It also helps you close the door on significant security vulnerabilities.
Collaboration Through the Cloud
Cloud tools are everyway these days, and O365 does a particularly good job of encouraging cloud collaboration. No matter what documents you’re working on, they are connected across Office 365 via platforms like SharePoint, so that you team can see them, share and work on them at the same time. Cloud collaboration is built in from the ground level for Word, Excel, Outlook, PowerPoint, and other core Microsoft apps.
Additionally, Office 365 adds powerful collaboration tools that help teams communicate.

The “Teams” app allows people to connect with each other and share information in a more casual IM/email combo.
Planner lets you to schedule events across the office, or assign tasks to specific teams.
Yammer is a social space where you can share docs, videos, updates and questions with your groups.

Office 365 comes with plenty of collaboration tools for the modern business—All you have to do is take advantage of them.
Syncing Data Across Everything
O365 is fully synced, another advantage of using cloud computing to share data. In other words, it doesn’t matter which device you switch to, your O365 apps will all be updated with the latest changes so that you won’t miss out on anything. This widespread syncing is a boon to young companies that need flexibility for their busy employees who hop from one device/location to another. Everything stays up to date, and no one gets confused because a meeting or document got changed.
Plus, syncing with Office 365 doesn’t require a VPN (virtual private network) or other complex setup on your part—Everything syncs right “out of the box” for the services you use, without any extra effort.
Cost Considerations
Startups may see higher fees when they first switch to O365, since the subscription-pay structure is more expensive than a one-time software purchase. However, Microsoft designed it this way to provide more value by including additional services and  tiers for different types of businesses.
The good news about this subscription model is that fees are very predictable. They become a set item on the budget so you don’t need to worry about sudden expenses when adopting new technology or creating a new position.
Excellent Threat Intelligence
When you’re ready to upgrade your security, Office 365 is right there waiting for you to make the move. Part of the O365 package (including in the E5 Enterprise tier) is a new Threat Intelligence  that includes tailored administrator reports about ongoing security efforts, new threats, and steps to take to secure data. These reports also access systems operations look for suspicious activity, and report it in alerts.
Remember, hackers love to target smaller companies because they often don’t have the strong security that larger corporations do. Prove them wrong by advancing your security efforts.
Reliability and Recovery
Microsoft aims for 99% uptime on its O365 services. If they do go down, you can bet that they’ll be available again in short order. This reliability is important to meet key deadlines – It’s also better than many smaller vendors can offer. Additionally, the cloud-based nature of O365, and the extended use of OneNote and backup services means that data is generally easy to recover if the worst happens and you lose information.
New Lead Management Services
One of O365’s newest benefits for smaller companies is Connections, an email marketing service that allows you to manage and automate leads from Outlook.  Set appointments, keep track of contact information, reply to discussions, and much more. It’s very useful for a business that’s still building a customer base but isn’t quite ready for a full marketing platform.
Simplified Invoicing and Listing
Finally, Office 365 provides Listings and Invoicing, two vital services for small businesses. Listings helps you manage your online business profiles to make sure your contact/location information shows up where it should. Invoicing helps you quickly create, send and monitor invoices for clients, plus it’s customizable for a variety of industries.
Interested in Microsoft Office 365 for your business? Let’s talk about it! CompNetSys provides a variety of data services and IT consultations for companies like yours. Contact us at 1.866.205.8123 or sales@compnetsys.com to learn more.

Top 12 Tech Gifts of 2017: The Apple iPhone X

Top 12 Tech Gifts of 2017: The Apple iPhone X

We like tech, it’s what we do. As the holiday shopping season kicks into overdrive, we are bringing you 12 of the most requested, most wanted tech gifts for 2017. Check back each business day between now and December 19th for another must-have tech item and why you should check it out.

There’s little denying that this year’s “must have” tech item must be the new iPhone X from Apple. The iPhone X (pronounced “ten”) arrives during the tenth anniversary of the original iPhone back in 2007. Apple has released their iPhone 8 this year as well, but the big dog here is the iPhone X.
Sporting a 5.8-inch, OLED super retina HD display, the screen is capable of 4K video up to 60 frames per second, stunning colors, true blacks, and a 1,000,000 to 1 contrast ratio. It’s the largest iPhone screen to date. It sports dual 12 MP cameras that use facial recognition to unlock your phone. The home button is gone and has been replaced with facial recognition.
The phone is water and dust resistant and covered front and back in the most durable glass in a smartphone. The iPhone X has an all glass and steel construction including surgical grade stainless steel. The new iPhone charges wirelessly.
If all this sounds like your cup of tea, prepare to empty the bank to get one. The 64 GB model will run you $599.99 while the 256 GB model goes for $799.99, both prices are with a two-year contract. It comes in both silver and space gray. All Apple stores, carriers, and retailers have limited stock with several not shipping until mid-December. It’s best to get your order in as early as possible.
The new iPhone a bit too pricey this Christmas? Keep an eye out next week for a less expensive alternative for the must-have smartphone.
Happy Holidays and good luck on the tech hunt from all of us here at {company}!