Technical Action Group

Blog

Fake CEO and 4 other types of email scams (phishing)

We all laughed heartily when James Veitch told his story (scroll below for video) of working with a spammer to ‘sell gold’. But most phishing scams don’t have such happy endings. Real people and businesses have lost millions of dollars ...

Small Business Cyber Security Trends for 2020

Have you ever visited a website only to see a scary red warning sign saying hackers might be trying to steal your information? You’re not alone and, like others, you probably shut down that webpage faster than you can say ...

Business vs. Consumer Laptops: Worth Paying the Extra Amount?

If you’re looking to buy a laptop that works well for personal and business use, know that you’re in the majority. This is a common trend among consumers because, nowadays, there is no real distinction between a home and an ...

Disaster Recovery Plan Steps: How to Protect Your Network before an Attack Occurs

Businesses today rely on a plethora of IT infrastructure. From emails to critical client data, all are reliant on a vast network of interconnected devices. Unfortunately, the convenience of cloud computing and web applications makes business owners complacent about planning ...

A Timeline of Facebook Security Scandals: Lessons We Can Learn

At the time of writing of this article, Facebook is on the verge of launching its own currency, Libra - no doubt, with some (ironic) allusion to ‘liberation’. There are many questions around this global transaction platform – being championed ...

Shopping For Disaster Recovery Solution Providers? 7 Factors To Consider

Data protection is key to disaster recovery solutions. And, yet, Forbes reports 90% of small businesses don’t have data backup in place. It is truly an astonishing statistic. With trade secrets, intellectual property and entire businesses hinged on computers and ...

Critical Measures To Take In A Ransomware Cyber Attack

The ransomware cyber attack has grown as a cyber-threat exponentially in the past few years. Ever since the WannaCry attack in 2017, news media has reported large scale ransomware attacks regularly. And no individual or organization is safe from ransomware. ...

Do Your Systems Have Malware? 6 Malware Protection Best Practices

Malware is one of the single biggest risks businesses face today. Why? It’s because confidential client and financial information, customer databases, business strategies and intellectual property are stored electronically. In fact, in such a digital world, many businesses rely solely ...

Hacking with a Purpose: The Many Applications of Ethical Hacking

On hearing the word ‘hacking’, people think of cybercriminals stealing credit card information, business data or personal details and having it held for ransom or having it sold to other cybercriminals. ‘Hacking’ is a term that has always been received ...

Scared about the cost of managed IT? Here's how much you can save yearly

Businesses across the world are increasingly relying on outsourced Information Technology (IT) service providers. And, why wouldn’t they? Small businesses would do better with a managed IT team, rather than hiring in-house staff. With limited capital and funding, scouting out ...

Contact

Technical Action Group
56 The Esplanade Suite 212
Toronto, Ontario M5E 1A7

Phone: (416) 489-6312
Email: Info@TechnicalActionGroup.com

Social Media