Categories
Blog

The Kaseya VSA Ransomware Attack

Unfortunately, ransomware continues to make headlines, with the recent attack on Kaseya VSA products affecting 1500 organizations across the globe. 

Although WorkSmart does not use Kaseya VSA products and has not been impacted by this attack, it’s important to use this as an opportunity to grow our security practices and help you do the same.  

Categories
Blog

What is ransomware?

As you may have seen in the news recently, ransomware can be a very time-consuming and expensive threat. Luckily, there are steps to take that can help prevent these cyberattacks. Here’s everything you need to know about the menacing malware.

Categories
Blog

Marissa Explains IT All: What is the Principle of Least Privilege?

Want to hear an easy way to limit the risk of exposing secure information?

Categories
Blog

Why Shutting Down Your Computer May Be A Security Risk

Forget everything you know – at least when it comes to shutting down your computer. With Windows 10, ‘shut down’ and ‘restart’ no longer do the same thing, so if you only shut it down, your computer may be a security risk. Here’s what you need to know.
Categories
Blog

Security News: Microsoft Exchange

WorkSmart is aware of the vulnerabilities being used to attack on-premise versions of Microsoft Exchange Server. We have confirmed that our clients using Exchange have the updated security patches already installed, and thus are protected. WorkSmart does not use the on-premise version of Microsoft Exchange. Microsoft confirmed that Exchange Online, the hosted email service provided by Microsoft 365, is not affected.

Categories
Blog

11 Tips for Protecting Your Small Business from Cyber Attacks

The right cybersecurity strategy can protect your small business from cyber attacks. In the blog, we’ll cover 11 cybersecurity tips to help you secure accesses to your technology, use traditional (and proven) security measures, and modernize your approach to cybersecurity.

Categories
Blog

4 Ways Azure AD Can Benefit Your Business

As more accounts move to the cloud, the key to securing your company’s data is managing access effectively. Azure AD is a cloud-based identity and access management tool that helps you simplify security and allows your team to work from anywhere.

Categories
Blog

How to Identify Cybersecurity Risks & Plan Your IT Security Strategy

Cybersecurity continues to be a key factor for success in the modern workplace.

Whether an attack has happened yet or not, your organization is vulnerable. That’s why it is crucial to have a plan that supports your business.

Categories
Blog

Data Security in the Cloud: Azure AD and Microsoft Intune

As companies continue to operate remotely because of the pandemic, business continuity remains a focal point of IT strategy. Managers and employees need to have tools that allow them to stay secure and be productive—no matter where they are.

Categories
Blog

Two Cybersecurity Services Missing from Your IT Security Plan

Cybersecurity is a priority, but it can be complicated to navigate for small businesses with limited resources. While you’re likely covered by traditional security tools like a firewall or anti-virus, and advanced threat protection, small businesses haven’t had the resources to ensure their security systems are working well. However, you can leverage two key cybersecurity services to continuously strengthen your IT security plan.