-
An internal survey in the Justice Department of Ottawa shows that almost 2,000 of their staff is likely to fall victim to a phony “phishing” link in their email. In December, to address questions about the security of sensitive information, the Justice Department launched a security exercise by sending emails to 5,000 employees. This determined […]
-
Your business relies on mobile computing now more than ever. Your employees work remotely, and use a variety of mobile devices like smartphones, laptops and tablets. However, in today’s world of increasing cyber threats, your business requires greater security when relying on mobile devices, than in years past. Mobile devices get lost, and data gets […]
-
Ransomware is a form of malware that attempts to hold your data hostage. If it succeeds, you’ll be contacted by a cyber criminal who will demand an immediate payment for the release of your data. Ransomware attacks have increased by 91 percent in just one year. Most are aimed at small to mid-sized businesses. Ransomware […]
-
If you use an iPad for personal use, you know how convenient it can be. But, maybe you aren’t sure whether it’s the right tool for your business needs. If so, perhaps the following reasons will convince you that it is. Using the iPad for business helps you: Access your business email. With Microsoft ActiveSync […]
-
If you pay attention to the news, you read or heard recent reports about Chinese officials hacking into the IT systems of U.S. companies. They did this to acquire trade secrets. Now, it seems that the suspected hacking group, Putter Panda, is linked to the People’s Liberation Army in Shanghai. Plus, according to the network […]
-
Does it seem like you spend more time than you should preparing documents in Office? You are if you aren’t using these speedy keyboard shortcuts. It may take you some time to get into the habit of using computer keys, instead of the mouse to complete tasks, but it will be worth your efforts in […]
-
July 1, 2014: Canada’s new anti-spam law will go into force. It ensures that businesses can compete effectively in the global marketplace. January 15, 2015: Another act goes into force that prevents the unsolicited installation of computer programs or software. They prohibit the: Transmission of commercial electronic message without recipients’ consent. Either explicit or […]
-
1. TextPlus lets you send free, unlimited text messages, and it’s also free. TextPlus is more than a glorified instant messaging app. It brings real SMS to your iPhone or Android, and also has a group-chat and landscape mode for writing. It doesn’t require you to enter your phone number to use the application.(For U.S. […]
-
When your technology fails, your day-to-day operations come to a complete halt. But there’s no need to take risks – Compunet specializes in providing IT Services and Support for various industries. To learn more, give us a call at
(604) 986-8170 or send us an email at
info@compunet.ca. As technology continues to become increasingly complex, your […]
-
Another version of CryptoLocker has just been released by the criminals who created the Australian Electric Company Bill version earlier this week. Except, this version has been improved, with a different mode of delivery. It comes in the form of a plain text email that asks you to click a link to view your fax. […]
-
Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware that WILL encrypt your organization’s data if executed. The majority of this traffic is coming through trusted free file share programs masked as voicemail messages or faxes. Our IT security experts are […]
-
Search Engine Optimization, or SEO, is a collection of tactics that help to rank your business website in the first positions of a Google search. There are many elements to developing a solid SEO strategy, but the following are five tips to help get you going. Link Your Sites. It’s helpful to link your social media […]