Explore cybersecurity best practices

  • What would you do if your smartphone was lost or stolen?
    What would you do if your smartphone was lost or stolen?

    We have all become dependent on our smartphones. They perform several essential functions in everyday life: security, travel, communication, payment. If one morning your phone fails to start, is stolen, or mysteriously disappears, what would you do? I will guide you through 4 steps and 5 key actions to ensure that you are fully prepared.

  • Create a simple and pragmatic continuity plan
    Create a simple and pragmatic continuity plan

    Considering the risks of IT disasters, outages, and cyber attacks, you must be prepared. There are many acronyms to describe the contents of a Business Continuity Plan (BCP). Knowing where to start and what type of continuity plan will work best for you is essential.

  • Document processes to increase your organizational resilience
    Document processes to increase your organizational resilience

    Documenting processes is often seen as a tedious and unnecessary activity. « I know what I have to do ». It’ s true, but we don’t take the time to document for ourselves. It’s for others.

  • I forgot my password (again)…
    I forgot my password (again)…

    To prove my identity, there are three ways: something I am, something I know and something I have Multi-factor authentication helps secure accounts, adding an element of authentication with what I have (my phone in general) or what I am (fingerprint or face). However, the password remains the basis of authentication, it is the secret that only I know. This is why it is important to secure passwords.