Archives - Small Business


Have a plan in place in case your business experiences a cyber incident

Even the best cybersecurity money can buy can’t claim to be invulnerable to cyberattacks. Cybercrime prevention is vital, but so is having a response plan in the event of an incident. This means training your employees on what to do if they recognize a cyberattack is taking place. Knowing who to contact and having clear […]

If you own a business, consider replacing your MPLS network with SD-WAN

Multiprotocol layer switching (MPLS) networks have, for decades, been the gold standard for businesses that need wide-area network connectivity between several different locations. But due to their age, they have difficulty integrating with newer technologies such as cloud computing. They’re also notoriously expensive and difficult to configure. An increasingly popular alternative to MPLS is software-defined […]

Entrepreneurs, beware of malware and phishing scams

There are special brands of malware and phishing for small businesses. Small businesses are a huge target for cybercriminals because of the potential financial gain combined with the often inadequate security of small business networks. Not everyone can hire a dedicated cybersecurity team to protect them. If you’re unfamiliar with terms such as whale phishing, […]

Is a digital signature secure?

A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). Digital signatures generate a virtual fingerprint that is unique to a person or entity and are used to identify users and protect information […]

Don’t allow unknown users into your online meeting

If there’s the potential for mischief on the internet, it’s almost certain someone’s going to take advantage of it. Such is the case with online meetings. There have been quite a few cases of bad actors trying to find their way into these meetings to disrupt them, often by displaying inappropriate or obscene content. This […]

Test your DKIM records

Domain key identified mail (DKIM) uses public and private keys to ‘sign’ an email you’re receiving. This often prevents messages from hitting spam or junk, and isn’t completely necessary. However, it’s worth adding DKIM verification to your email domain. Different providers have their own techniques for doing so, but once it’s up, send a test […]