Blog

The latest news from The Garden Shed

The True Cause of Data Breaches

2019 is becoming a remarkably prominent year for data breaches. Recent reports by Risk Based Security shows a huge increase in data breach incidents of[...]

[Webinar Replay] 2019 Top 5 Cybersecurity Practices for your Business

Cybersecurity is a burning hot topic in the industry today. It is the practice of ensuring that your business is protected from malicious actors and[...]

CyberInsurance: Why You Need to Talk to Your Broker Today

In 2014, five hundred million user accounts perished under a massive cyber attack. Personal data such as the users’ full names, birth dates, phone[...]

Using an Intelligent Firewall is as Good as the Great Wall

In years gone by, we may have thought the chance of experiencing a cybersecurity breach was pretty low but, these days, the more aware business leaders[...]

Windows 7 Must Die

If you’re still using Windows 7 as your operating system, it’s time to start planning the upgrade to a newer version. Windows 7 is coming to an end, my[...]

The End of Microsoft's Password Expiration Policy

You slide into work, coffee in hand and motivation to burn, ready to kick off another productive day. As you sit at your desk, ready to log on to your[...]

10 Tips to a Tech-Tidy Up and Why You Should Start Today

It’s not exactly Spring in this neck of the woods, but it never hurts to do a cleanup starting with your tech devices and electronics. Now, I’m not[...]

Microsoft says NO! To Passwords

Microsoft has been dropping big news after big news since the beginning of 2018. Last September though, news broke about a game-changing plan – “No[...]

How Easy Is It to Guess Your Password?

It is a common understanding that passwords are supposed to protect our accounts. But how much does your designated password protect you and your[...]

Three Reasons you need to enable Multi Factor Authentication (MFA) today

Multi-factor authentication (aka MFA, 2-factor authentication, 2fa and so on) is a highly recommended, additional layer of security for the user[...]

1 2 3
?

Recent Posts