416-410-5030 | Client Login | Remote Control Remote Control

Logical Talk

The Idealogical Blog

­
Idealogical

About Idealogical

For over a decade, Idealogical has provided the Greater Toronto Area with managed computer support services designed for small business – everything from expert installation and implementation to remote and on-site technology management.

Do You Have a Strong Password Policy to Protect Your Business?

Passwords are an essential security aspect and provide an important first line of protection for the electronic resources, business data, and intellectual properties that are critical for your business.

Having a strong password is one way that each employee can contribute to the overall security of your business.

Strong passwords will help you prevent unauthorized or inappropriate access to email accounts, cloud data and your overall business network.

How will you and your organization benefit from having a strong password policy?

Strong passwords will protect you and your business from ransomware, malware, spam, viruses, phishing and other malicious cyberattacks.

What are the Strong Password specifications and guidelines?

All users must maintain a password that meets the following minimum requirements:

  • Must be a MINIMUM of 8 characters
  • At least one uppercase alphabetic character (A-Z)
  • At least one lowercase alphabetic character (a-z)
  • At least one special character (!@#$%^&*)
  • At least one number
  • No blank spaces

What are the other measures you could take to protect yourself using strong passwords?   

  • Avoid using any of your last five passwords.
  • Avoid using your first name, last name or the word PASSWORD as your password.
  • Change your password frequently.
  • Never write your password down or store it electronically.

At Idealogical, we […]

By |November 11th, 2019|Helpful Advice|0 Comments

How Do You Turn Automatic Updates On or Off in Windows 7?

Ensuring you install important updates as they become available provides significant benefits, such as improved security and reliability. You can set Windows to automatically install recommended updates, which can address non-critical problems and help enhance your computing experience. Optional updates and Microsoft updates are not downloaded or installed automatically.

For more information about automatic updating and installing Windows updates, see Understanding Windows automatic updating and Install Windows updates in Windows 7.

To learn more about the types of updates that Microsoft publishes, go to the Microsoft updates terminology article on the Microsoft Help and Support website.

1. Open Windows Update by clicking the Start button. In the search box, type Update, and then, in the list of results, click Windows Update.

2.In the left pane, click Change settings.

3.Under Important updates, choose the option that you want.

4. Under Recommended updates, select the Give me recommended updates the same way I receive important updates check box, and then click OK. Administrator permission required If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

You can also choose if you want to allow anyone to install updates by selecting the Allow all users to install updates on this computer check […]

By |October 31st, 2019|Knowledge Base|0 Comments

7 Security Protections Every Business With 15 to 150 Employees Should Have in Place Now

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” This report will get you started in protecting everything you’ve worked so hard to build.

Attackers use sophisticated software systems to hack into small businesses like yours to steal confidential information such as credit card details, client information, and other organization-specific data.

Why would hackers attack small businesses when they can target big corporations? There are two simple reasons:

  1. It is harder for hackers to get past sophisticated security at big corporations
  2. Hackers know small businesses have cybersecurity measures on their back burner

82,000 new malware threats are released every single day, and half of the cyber-attacks occurring are aimed at small businesses. We don’t hear about these stats until a report comes out in the following year, talking about the amount of financial loss and number of businesses closed because they could not recover from a cyberattack. Because of all of this, it’s critical that you have these seven security measures you should have in place to protect your business.

 

1. Train Employees on Security Best Practices
The #1 vulnerability for business networks are the employees using them. It’s extremely common for […]

By |October 18th, 2019|Tips and Tricks|0 Comments

Why are Small Businesses the New Targets for Cyberattacks?

36 per cent of recent cyberattacks were targeted against businesses with fewer than 250 employees

Every time we mention cybersecurity to a small business owner or a senior executive, we often get a monotonous response – we are too small of a business for cyberattacks.

But, according to a study by the security software company Symantec, 36 per cent of recent cyberattacks were targeted against businesses with fewer than 250 employees in 2018.

Let us help you understand why small businesses are the new target for cyberattacks by hackers.

1. Hackers know what small business leaders are thinking

Hackers know that small business owners do not take security measures very seriously as big enterprises do. Hackers are aware of the fact that within a few attempts, they will be able to get into your system and use it as a gate pass to damage your data, network and in some cases, your entire IT infrastructure.

2. Poor to none cybersecurity protocols

Small business owners often have too much on their plate, and far more important decisions to make; as a result, cybersecurity falls on their back burner. Hackers know that targeting a small entity means fewer efforts from their end. The success rate of hacking […]

By |October 9th, 2019|Knowledge Base|0 Comments

9 Tips to Prevent You from Cyberattacks

A cyberattack can cause data breach that could cripple your small business, costing you thousands or millions of dollars in loss, detection and recovery.

Here are 9 tips to prevent you from cyberattacks that will make you a responsible employee.

1. Software Updates

Keep your software update. Cyber attackers frequently use known flaws in your software to gain access to your system.

2. Data Storage and Sharing

Avoid storing sensitive information on USB sticks or external hard drives. Instead, use OneDrive or SharePoint. This will prevent data loss if your device is stolen or attacked for ransomware.

3. Detect Phishing Emails 

Innocent employees unknowingly clicking on phishing emails may infect your entire network. Look for fonts, grammar, structure, and signature of the email; if it looks unusual, it is possibly a phishing email.

4. Set Strong Passwords

Stronger passwords act as a layer of protection. Avoid repeating the same passwords for different sites, update your passwords regularly and use two-to-three step authentication for confidential data.

5. Lock Your Device

It is tough for hackers to access locked devices. Use Win+L on Windows or Control+Shift+Power on Mac to lock your screen before stepping away from your device.

6. Trusted source downloads

We are all downloading new software or app every day. Ensure […]

By |October 1st, 2019|Tips and Tricks|0 Comments

How to prepare your business for Windows 7 End of Life Support

Earlier this summer, Microsoft announced it will no longer offer support for Windows 7 as of January 14, 2020. All Windows 7 users are getting timely ‘Upgrade to Windows 10’ pop-ups from Microsoft since April 2019.

Windows 7 has been one of the leading operating systems for the last 10 years for businesses, which means that the odds that your business will be affected is high. Ensure your business gets fully transitioned to Windows 10 to avoid security issues after Windows 7 End of Life support on January 14, 2020.

Our guide gives you the top things you need to consider so you aren’t left unprepared. Here is everything you need to know about Windows 7 End of Life Support.

What does Windows 7 End of Life mean for my business?

It means that Microsoft will no longer oversee the health of the Windows 7 operating system. There will not be any more upgrades, patching of security holes and support from their tech team, should you require assistance after January 14, 2020.

Why is Microsoft ending support for Windows 7?

There are a few reasons, the main one being – Windows 7 is a 10- year-old operating system. Additionally, Microsoft already has Windows 10 as its new top-performing operating […]

By |September 27th, 2019|Uncategorised|0 Comments

Using Exchange 2010? Read This

If your business is still using Microsoft Exchange Server 2010 for email, it’s time to reconsider your options (before it’s too late, and your business suffers).

Microsoft is ending support for Exchange 2010 next year, and if you wait too long to decide on migration options, more than likely, you’ll open up your organization to unwanted malicious attacks from cybercriminals looking to exploit.

The good news is there are options for businesses preparing for Exchange 2010 End of Service (EOS).

What does EOS for Exchange 2010 Mean?

Microsoft is ending support to several of its software products — including Exchange 2010 — on January 14, 2020.

While businesses can still use Exchange 2010 after its EOS date, they will not be protected from new viruses, spyware, and other malware.

The tech giant will no longer provide the following when it ends support for Exchange 2010:

  • Technical support
  • Bug fixes
  • Security fixes
  • Time zone updates

These businesses should begin migration planning today to avoid support gaps.

There are a couple of migration options for businesses to consider before Microsoft ends support for Exchange 2010.

Migrate to Office 365

Migrating from Exchange 2010 to Office 365 is the easiest and fastest route for businesses to take when preparing for Exchange 2010 EOS.

With […]

By |May 10th, 2019|Logical Talk|0 Comments

What Manufacturers Should Know About IoT

Consumers aren’t the only ones benefiting from the internet of things (IoT). Manufacturers are also reaping the rewards of leveraging the industrial internet of things (IIoT) to increase energy efficiency and improve productivity in their factories and more. For some manufacturers, IoTT is a foreign abbreviation, but there’s time to learn.

What is IoT?

The IoT is a concept many users are familiar with. Even if they don’t understand the granular details, users, at the very least, grasp the basics of how the IoT impacts their daily lives, and even if they don’t, a brief overview of the concepts basics should suffice.

Basically, think of the concept like this: Some physical devices connected to the internet can collect and share data with one another. Sounds simple enough, but there’s a little bit more to it than that. Consumers benefit when their connected devices collaborate.

Take home automation as an example. Smart devices (simply, devices capable of connecting to other devices and networks) have changed homelife for the better. For instance, now, instead of changing room temperatures at thermostats, users can control room temperatures from their own smartphones. Better yet, some thermostats learn user preferences and adjust accordingly, potentially saving consumers on heating costs. If […]

By |February 20th, 2019|Logical Talk|0 Comments

What Microsoft’s EOS Means for Line of Business Apps

With Microsoft ending support to several of its products in January 2020, many businesses are left scrambling for solutions. While many of the technology giant’s products reaching the end of support (EOS) next year are operating systems (OSs), other applications, essential pieces of software, are vulnerable, too, if they’re not appropriately evaluated. Called line-of-business applications (LOBs), these programs need to be updated if the OSs they’re operating on is either upgraded or migrated to the cloud.

What you should know about LOB applications

Basically, any program essential to the running of your business is a LOB application. These applications tend to be a little bit larger than other applications on your network. LOB applications are generally divided into two categories: department and industry.

Within your organization, to function properly, departments use certain applications on a day-to-day basis. For example, to accurately keep track of your finances, your accounting department, more than likely, uses an accounting application, such as QuickBooks, so for this particular department, accounting software is a LOB application.

Then, there are LOB applications for specific industries. For example, if you own an architecture firm, your architects are using CAD software — such as AutoCAD — to design, modify and optimize structures. For […]

By |February 7th, 2019|Logical Talk|0 Comments

Going Into 2019: What to Know About Cloud Security

No doubt about it: The interest in cloud computing is continuing to grow. As the market expands, IT professionals across the board are working day and night to minimize potential security threats associated with the technology. Going into the new year, there are a few points SMBs should consider before partnering with IT professionals on the cloud.

Many are concerned with cloud security, including IT professionals

A Kaspersky Lab report in October 2018 revealed what chief information security officers (CISOs) consider to be today’s top IT security risks: Cloud computing and uncontrolled cloud expansion by line of business (LOB) applications (i.e., software designed to help businesses operate) topped the list. The results of another survey found that 90% of cybersecurity professionals are concerned with cloud security. Specifically, when it comes to cloud computing, respondents cited three top security challenges: protecting against data loss and leakage, threats to data privacy and breaches of confidentiality.

Going into 2019, cybersecurity professionals aren’t the only ones concerned with security in the cloud, especially with regard to one area specifically — confidentiality. For example, in November 2018, the American Bar Association (ABA) released the findings of a survey it conducted of solo and small firm attorneys across the country. […]

By |January 30th, 2019|Logical Talk|0 Comments