2023OCTOBER VOLUME34
Convenienceof workplacecollaborationtools,p1
Cybersecurity skeletons in your business' closet, p2
What is SaaS Ransomware?, p3
The new Microsoft Intune Suite, p4
9 reasons to use airplane mode even if you’re not traveling, p5
Webinar:TheEvolutionofCybersecurity,p6 TechnologyUpdate,p7 WhatisallthishypeaboutAI?,p8 Entertainment:TriviaandGadgets,p9
COLLABORATIONTOOLSAREGREAT. BUTARETHEYASECURITYRISK?
Whodoesn’tlovetheconvenienceof workplacecollaborationtoolsandmessaging appslikeSlack,Teams,andZoom?
Wecanchatwithcolleagues,sharefiles,hold meetings,andevendiscusssensitivetopics withoutleavingourcomfyhomeoffices.It’s allsunshineandrainbows…untilcyber attackersdecidetorainonyourparade.
Yousee,whilsttheseplatformshavebecomea blessingforproductivity,they’vealsoopeneda Pandora’sboxofcybersecurityrisks
DidyouknowthatSlack,despiteusing encryption,doesnotfeatureend-to-end encryption?It’sbelievedthisissoclientscan maintainvisibilityintotheircompany’s communications.
OrifyouuseWhatsAppforyourbusiness,it hasbeenexploitedinavarietyofsocial engineeringattacks?
Andlet’snotforgetTelegram,whichhas becomeaprimetargetforcyberattackers.
Thishasgivenbirthtoanewattackcategory–BusinessCommunicationCompromise(BCC),a sinistercousinofthemorefamiliarBusiness EmailCompromise(BEC).
82%ofdatabreachesinvolvethehumanelement, accordingtoVerizon’s2022DataBreachInvestigation Report.Aninnocentclickonaphishingemail,and yourcommunicationplatformsbecomeaplayground forcyberattackers
Here’showyoucanstaysafe.
Enforcestrictaccesscontrols,soonlypeoplewho aresupposedtogetintoyourplatform,candoso Somethingsimplelikemulti-factorauthentication canbeapowerfuldeterrent
Implementdatalosspreventionmeasures.Usea systemwithencryptionandmakesurelostor stolendevicescanberemotelywiped
Andtrainyourteamhowtoprotectsensitive information
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
FeaturedCustomer-Acharitableorganizationthatfocuseson animalhealthasawaytoimprovethehealthofcommunities,p10 1
Ifwecanhelpyoustaybetterprotected,getin touch.
""YOURMONTHLY YOURMONTHLY NEWSLETTER,WRITTENFOR NEWSLETTER,WRITTENFOR HUMANS HUMANS,NOT,NOTGEEKSGEEKS" "
CYBERSECURITYSKELETONSINYOUR BUSINESS'CLOSET
Let’s dive into a topic that might give you the chills cybersecurity skeletons in the closet. You may not have old skeletons hidden away in the basement, but there’s a good chance of cybersecurity vulnerabilities lurking in the shadows. Just waiting to wreak havoc.
You can’t fix what you can’t see. It’s time to shine a light on these hidden dangers, so you can take action to protect your business from potential cyber threats.
Here are some of the most common cybersecurity issues faced by SMBs:
Outdated Software: The Cobweb-Covered Nightmare
Running outdated software is like inviting hackers to your virtual Halloween party.
When software vendors release updates, they often include crucial security patches. These patches fix vulnerabilities that hackers can exploit. Keep everything up to date to ensure your digital fortress is secure.
Weak Passwords: The Skeleton Key for Cybercriminals
If your passwords are weak, you might as well be handing out your office keys to cybercriminals.
Instead, create strong and unique passwords for all accounts and devices. Consider using a mix of upper and lowercase letters, numbers, and special characters.
Unsecured Wi-Fi: The Ghostly Gateway
Ensure your Wi-Fi is password-protected. Make sure your router uses WPA2 or WPA3 encryption for an added layer of security. For critical business tasks consider a virtual private network (VPN). It can shield your data from prying eyes.
Lack of Employee Training: The Haunting Ignorance
Employee error is the cause of approximately 88% of all data breaches.
Without proper cybersecurity training, your staff might unknowingly fall victim to phishing scams. Or inadvertently expose sensitive information. Regularly educate your team about cybersecurity best practices.
NEWS|MAINSTORIES 2
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com (Continued on next page)
Such as:
Recognizing phishing emails
Avoiding suspicious websites
Using secure file-sharing methods
No Data Backups: The Cryptic Catastrophe
Imagine waking up to find your business’s data gone, vanished into the digital abyss. Without backups, this nightmare can become a reality.
Embrace the 3-2-1 rule. Have at least three copies of your data, stored on two different media types. With one copy stored securely offsite.
No Multi-Factor Authentication (MFA): The Ghoulish Gamble
Adding MFA provides an extra layer of protection. It requires users to provide extra authentication factors. Such as a one-time code or passkey. This makes it much harder for cyber attackers to breach your accounts.
Disregarding Mobile Security: The Haunted
Phones
Ensure that all company-issued devices have passcodes or biometric locks enabled. Consider implementing mobile device management (MDM) solutions.
These will enable you to enforce security policies.
Shadow IT: The Spooky Surprise
Shadow IT refers to the use of unauthorized applications within your business. It might seem harmless when employees use convenient tools they find online.
Regularly audit your systems to uncover any shadow IT lurking under cover.
Incident Response Plan: The Horror Unleashed
Develop a comprehensive incident response plan. It should outline key items such as how your team will detect, respond to, and recover from security incidents. Regularly test and update the plan to ensure its effectiveness
WHATISSAASRANSOMWARE?HOW CANYOUDEFENDAGAINSTIT?
Software-as-a-Service (SaaS) has revolutionized the way businesses operate. But alongside its benefits, SaaS brings with it potential threats. When software and data are online, they’re more vulnerable to attacks. One of the latest threats to move from endpoint devices to the cloud is ransomware.
Between March and May of 2023, SaaS attacks increased by over 300%. A study in 2022 by
ransomware attacks targeted SaaS data.
What is SaaS Ransomware?
SaaS ransomware is also known as cloud ransomware. It’s malicious code designed to target cloud-based applications and services. These include services like Google Workspace, Microsoft 365, and other cloud collaboration platforms.
Educate Your
Team
Start by educating your employees about the risks of SaaS ransomware. Include how it spreads through phishing emails, malicious links, or breached accounts. Teach them to recognize suspicious activities and report any unusual incidents immediately.
Enable Multi-Factor Authentication (MFA)
MFA is an essential layer of Odaseva found that 51% of
Defending Against SaaS Ransomware
NEWS|
CONTINUATIONOFMAINSTORIES
(Continued from page 2 )
3 (Continued on next page) CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
(Continued from page 3)
security Enabling MFA reduces the risk of unauthorized access. This is true, even if a hacker compromises an account’s login credentials.
RegularBackups
Frequently backing up your SaaS data is crucial. Having up-todate backups ensures that you can restore your files. You won’t need to pay the attacker’s ransom demands.
ApplythePrincipleofLeast Privilege
Limit user permissions to only the necessary functions. By doing this, you reduce the potential damage an attacker can do if they gain access.
KeepSoftwareUptoDate
Ensure that you keep all software up to date. Regular updates close known vulnerabilities and strengthen your defense.
DeployAdvancedSecurity Solutions
Consider using third-party security solutions that specialize in protecting SaaS environments. These solutions can provide many benefits. Including:
Real-time threat detection
Data loss prevention
And other advanced security features
Track Account Activity
Put in place robust monitoring of user activity and network traffic. Suspicious behavior can be early indicators of an attack One example to watch for is several failed login attempts Another is access from unusual locations
Develop an Incident Response Plan
Prepare and practice an incident response plan It should outline the steps to take in the event of a ransomware attack A well coordinated response can mitigate the impact of an incident It can also aid in faster recovery The sooner your team can respond, the faster business gets back to normal
SHOULDYOUR BUSINESS UPGRADETO THENEW MICROSOFT INTUNESUITE?
Endpoint management has changed a lot over the last two decades
The average enterprise endpoint makeup is 60% mobile devices And it’s estimated that they handle about 80% of the workload What does this mean for security? That’s why an endpoint device management solution has become a necessity.
One that might be on your radar is the new Microsoft Intune Suite. It bundles several areas of endpoint management into a single platform.
What Does Microsoft Intune Suite Include?
It includes all the core features of Intune, plus:
Microsoft Intune Remote Help Microsoft Intune Endpoint
Privilege Management
Microsoft Tunnel for Mobile
Application Management
Management of specialty devices
Select Microsoft Intune advanced endpoint analytics features
Advantages of Subscribing
Streamlined Device Management
Provide Secure Helpdesk Support
Enhanced Security and Compliance
App Management Made Easy BYOD-Friendly
Scalability and CostEffectiveness
What Do You Need to Consider?
Alright, those are some pretty compelling reasons to consider Microsoft Intune Suite But let’s take a moment to address some potential downsides you need to consider as well
(Continued on next page)
NEWS|
4
FINISHOFMAINSTORIES
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
Learning Curve
One common concern is the learning curve Luckily, we can help you with training and support to ensure a smooth shift.
Do You Have Legacy Systems?
Does your business rely on legacy systems or run a large number of onpremises servers? Then integrating Intune into your existing setup may take some extra effort
9REASONSTO USEAIRPLANE MODE EVENIFYOU'RE NOTTRAVELING
Most people are familiar with their device’s Airplane Mode. You’ve probably used it when jetting off to exotic locations. But did you know that it’s not just for globetrotters?
That’s right! Airplane Mode isn’t only for flying; it can be a handy feature for your everyday life.
Here are some top reasons why you should consider toggling it on, even if you’re not traveling.
Save that precious battery life
Boost your charging speed (by about 4x)
A tranquil escape from notifications
Focus Mode: Engaged!
Prevent embarrassing moments
6.Roaming woes, be gone!
7.A digital detox
8.Avoid unwanted radiation
9.Save data and money
TIPSTO OPTIMIZEA DUALMONITOR SETUP
Two monitors are often better than one when it comes to getting things done efficiently. A dual-monitor setup can significantly enhance your productivity. This is true whether you’re a gamer, a creative professional, or an office wiz who loves to multitask.
It’s common for people to feel “off kilter” when trying to work from two monitors The cause is usually the setup.
Here are some dual-monitor setup best practices to help you improve your two-screen experience and take it to the next level 1.
Match size and resolution
Get the right cables
Positioning is everything Embrace the Extended Desktop Focus on Taskbar Tweaks Leverage Shortcuts
Gaming in style
LEARNING ESSENTIAL CYBERHYGIENE
As technology continues to advance, so does the need for
heightened awareness. As well as proactive measures to safeguard sensitive information.
Cybersecurity can seem like an insurmountable task for everyday people. But it’s not only a job for the IT team. Everyone can play a part in keeping their organization’s data safe. Not to mention their own data.
October is Cybersecurity Awareness Month.
It serves as a timely reminder that there are many ways to safeguard data. Following the basics can make a big difference in how secure your network remains.
This is CAM’s 20th year. To celebrate, the theme revolves around looking at how far cybersecurity has come. As well as how far it has to go. This year, CAM focuses on four key best practices of cybersecurity:
Enabling multi-factor authentication
Using strong passwords and a password manager Updating software
Recognizing and reporting phishing
TECHNOLOGY|TOOLSFORYOURBUSINESS 5
2. 3. 4. 5. 6. 7.
3. 4 5
1. 2.
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com (Continued from page 4)
Sarahgraduatedfromthe Master'sprograminInformation TechnologyatthePhilippine ChristianUniversityinAugust 2022 Currently,sheispursuing herDoctorateinInformation TechnologyatLaConsolacion UniversityPhilippines,drivenby herbeliefintheever-evolving natureoftechnologyandtheneed forcontinuouslearning
AftercompletingherBachelor's degreeinComputerScience, Sarahbeganhercareerata governmentagencyinthe Philippines,whereshegained practicalexperienceduringher On-the-Jobtraining.Herskillsled toheremploymentasasoftware developerforweb-basedand desktopapplications.After8years
with the agenc chose to take a and started fre gaining valuab experience in A development a development f international c Sarah joined C February 2023 with her a stro background in development.
Outside of wor passionate abo games, cryptoc and AI. Her en not only enrich professional life but also provides a unique perspective to the team.
CYBERSECURITYMONTH
Join Our Exclusive Webinar!
OCTOBER 17, 2023, Tuesday, 1pm
The Evolution of Cybersecurity: What it Means for Your Business is an upcoming webinar that aims to educate business owners and managers on the latest trends and changes in the field of cybersecurity. With the increasing reliance on technology and the growing threat of cyber attacks, it has become more important than ever for businesses to take the necessary steps to protect their sensitive information and valuable assets.
During the webinar, attendees will learn about the various types of
cyber threats that businesses face, as well as the latest tools and techniques that can be used to prevent these threats from becoming a reality. They will also gain insights into the evolving nature of cyber attacks and how businesses can stay ahead of the curve when it comes to protecting themselves from potential harm.
By attending this session, business owners and managers can take proactive steps towards safeguarding their business and ensuring that their employees and customers are protected from the dangers of cyber crime Don't miss out on this informative and valuable
sarah@capitaltek.com
opportunity to learn about the latest developments in cybersecurity!
Register here: https://ctek link/webinar/evolut ionofcybersecurity
MEDIA&ARTS|ANNOUNCEMENT
6 CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
StaffHighlight
Web Developer
Trajano Sarah
BONUS!Joinuslivefor
SergeyPoltev Founder&CEO CapitalTek RyanMcBride ChannelSales LeadFieldEffect
yourexclusivechanceto winthebananaphoneon ourlivegiveaway!
NEWTOMICROSOFT365
Comingsoon:Fasterbackup forMicrosoftSharePoint, OneDriveandExchange
Microsoft365Backupissaidtobe apowerfuldatarecoveryservice, andit’scomingsoon.It’sdesigned tospeedilyrestoreyour OneDrive,SharePoint,and
TECHFACTS
Exchange data if you’ve suffered a breach. It even allows you to restore data within set date ranges.
A public preview is expected later this year. If it gets a positive reaction, we’ll be
The first ever webcam was deployed at Cambridge University, UK in 1991. It was designed to monitor a coffee pot, after scientists were fed up finding it empty
The first computer to be marketed as a laptop was the Gavilan SC in May 1983. It was priced at $4,000, weighed 9 pounds, and was powered by a 5 MHz Intel 8088 chip. Oh, it also ran MS-DOS. Things weren’t always better in the past
The biggest tech acquisition in history was not, as you might think, Elon Musk’s multibillion dollar takeover of Twitter (now called X) in 2022. Actually, the record sits with Dell’s 2015 acquisition of enterprise storage company EMC for $67 billion in cash and stock
Techn logy update
Custominstructionscometo ChatGPT
OpenAI is rolling out a new feature called Custom Instructions, for ChatGPT Plus subscribers. Through two prompts, you can tell ChatGPT about your specific requirements and preferred response format. Whether you’re marketing to prospects, or educating clients, this
innovativefeaturecatersto youruniqueneeds.
expecting a full rollout next year
TECHNOLOGYUPDATE|MICROSOFT365
“There’snoshortageof remarkableideas,what’smissing isthewilltoexecutethem.”
SethGodin, Writerandbusinessgenius
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
7
INSPIRATIONAL QUOTE OF INSPIRATIONAL QUOTE OF THE THE MONTH MONTH
ISAIREALLYFORYOU,ORAREYOU JUMPINGONTHEBANDWAGON?
Do you ever find yourself asking, “What is all this hype about AI?”
If so, you’re not alone
The buzz around artificial intelligence (AI) and its potential to revolutionize every aspect of our lives is inescapable. But how can you navigate through the noise and truly harness the power of AI to meet your business’s big goals?
It’s a question that keeps many business leaders awake at night.
Imagine being able to predict market trends before they happen, or to streamline your operations with almost exact precision. This isn’t some far-off dream; it’s the promise of generative AI.
But there’s a lot of speculation around AI. Right now, it’s uncertain, so… should you simply wait and see what happens?
Of course not!
In fact, now is exactly the time
to start exploring generative AI. Sitting back isn’t an option when your rivals could be leveraging this technology to gain a competitive edge. Yes, there’s a lot to learn and understand, but isn’t that part of the thrill of doing business in the 21st century?
But one thing to keep in mind amidst the excitement, is not to lose sight of your core aims, goals, and cultures. What good is a new AI system if it doesn’t align with the way your business behaves?
Whilst the world of AI may seem like uncharted territory, some classic rules still apply. Will you implement it? Will it generate revenue? Can it reduce your costs? Will it boost
productivity? If not, perhaps it’s not the right move for your business right now.
So, while the hype around AI is deafening, and the path ahead is not clear at all, the potential rewards are too great to ignore.
DID YOU KNOW...
Chrome plans to highlight risky extensions
Google is planning to make extensions safer for everyone, by actively highlighting the ones that have been made unavailable in the Chrome Web Store.
There are three reasons an extension may disappear; the developer has removed it, it breaches Google Web Store policy, or it’s malware. This new feature will leave you in no doubt about the potential risk of an extension that’s suddenly vanished.
OUROFFER|TEKCARE 8
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
TheFunnies
DID YOU KN W
A 2016 study in the Archives of Surgery medical journal showed that surgeons with a history of playing computer games made 37% fewer errors at work.
NEED A LAUGH?
Never use ‘beefstew’ as a password. It's just not stroganoff.
TECHNOLOGY TRIVIA
What is currently the world’s largest SSD with a whopping 100TB?
"ExaDrive DC100"
Aisizon Wireless Clip Mic
TechQuiz
Before becoming widely recognized as the main character of Super Mario Bros, what was Mario called? What does Yahoo stand for? What is the keyboard shortcut to directly open the Windows Task Manager? What does the term “Vaporware” mean?
1024 Gigabytes is equal to 1 Terabyte; 1024 Terabytes is equal to 1 Petabyte. How many Gigabytes are in a Petabyte?
Q&As
Q:
How can I tell if my email has been hacked?
A: The most obvious sign is if you can’t login But it’s not always that simple If you suspect something’s off, check your sent items and login activity for anything that wasn’t you. We can help if you’re worried.
Q:
Does my business need cyber insurance?
A: If you store or send data, it’s a good idea Every business is vulnerable to an attack or an employee’s error which puts you at financial risk, so insurance may remove some of the financial burden in such a situation.
Businessgadgetofthemonth Sonynoisecancellingheadphones
Whether you’re working in the office, or in a café, sometimes that ambient noise gets a little too ambient, doesn’t it?
That’s where these Sony WH-1000XM4 noise cancelling headphones can become your new best friend. They block out all the sounds around you, leaving you to focus on your work in peace and quiet, or to your favorite soundtrack without any outside interference.
$278 from Amazon.
The Aisizon Wireless Clip Mic is a versatile and high-quality microphone that allows you to capture clear and professional audio wirelessly. With its compact design and easy-touse clip, it can be conveniently attached to your clothing or any other surface, providing hands-free recording for various applications such as interviews, presentations, vlogging, and more This is the perfect companion for capturing crystal-clear audio on the go.
ENTERTAINMENT|TRIVIAANDGADGETS
1.
2.
3.
4.
The
1) JumpMan. Nintendo’s US office renamed him after their landlord 2) Yet Another Hierarchical Officious Oracle 3) Ctrl+Shift+Escape 4) It’s the term used for a product that’s been announced but never launched 5) 1,000,000 (but if you ask a developer rather than a hard drive manufacturer, they would say 1,048,576) 9
5.
answers are below
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com
FEATURE|CUSTOMERHIGHLIGHT
Veterinarians Without Borders/Vétérinaires Sans Frontières (VWB/VSF) is a nonprofit, charitable organization that focuses on animal health as a way to improve the health of communities. Put simply, we believe healthy animals, healthy humans, healthy planet
Globally, they focus on a few key issues - controlling rabies, promoting equality, responding to disasters where animals are present, and training and educating community animal health workers in areas where
there is no veterinarian. Throughout this, they always keep in mind the Onehealth perspective, where they consider animals, people and environment before making changes, because changing one thing, can change everything.
They are the Canadian affiliate of VSF International, but each affiliate operates independently. We operate in countries all over the world offering everything from spay/neuter programs, to gender equity seminars, depending on what is important, needed and wanted in a community. This small organization is made up of generous volunteers and dedicated staff. All work is made possible due to the kindness of individuals donors, as well as corporate and government grants
including our close partner, including our close partner, Global Affairs Canada Global Affairs Canada.
Veterinarians Without Veterinarians Without Borders/Vétérinaires Sans Borders/Vétérinaires Sans Frontières (VWB/VSF) Canada is Frontières (VWB/VSF) Canada is a registered charity # 84146 a registered charity # 84146 9547 RR0001 With 9547 RR0001.
headquarters located at: headquarters located at:
700 Industrial Ave #410,Ottawa, 700 Industrial Ave #410,Ottawa, ON K1G 0Y9, Canada ON K1G 0Y9, Canada
613-227-HELP(4357) help@capitaltek.com
capitaltek.com
Their head office is situated in
Their head office is situated in the unceded and the unceded and unsurrendered territories of the unsurrendered territories of the Anishinaabe Algonquin Nation, Anishinaabe Algonquin Nation, whose presence reaches back to whose presence reaches back to time immemorial. time immemorial
Award-winning managed IT services for small to medium-sized companies in Ottawa. We combine essentials with a comprehensive platform to keep you running worry-free 24/7.
ABOUTFOUNDER&CEO,SERGEYPOLTEV
Founder and CEO Sergey Poltev, has been fixing computers since he was a kid. He immigrated to Canada to seek new opportunities, where he launched CALLGEEK (later renamed to CAPITALTEK) in 2008. Sergey was recognized in 2021 with a Forty Under 40 Awards from the Ottawa Board of Trade & Ottawa Business Journal. And won the City of Ottawa 2022 Immigrant Entrepreneur Award held at the TiECON Canada Conference.
TEK Care NETWORK Care CYBER Care CLOUD Care SERVER Care APPLE Care
CapitalTekTeknologyInsider 613-227-HELP(4357) help@capitaltek.com capitaltek.com We'renowtakingon newclients! Setupa15minutediscoveryvideocallat
www.capitaltek.ca/talk-to-an-expert
10