profile image

Matthew Held

CEO and Co-Founder of Manawa Networks

Matthew Held is the CEO and Co-Founder of Manawa Networks, a full service IT consulting firm, based in Toronto, that serves small and medium organizations across Canada. Matthew writes about how technology makes people and organizations better. For more, contact mheld@manawa.net or www.manawa.net
EFE

5 Ways To Beef Up Your Computer Security In The Wake Of WannaCry

Ransomware is effective because it often arrives via an infected email attachment, like a Microsoft Word or Excel document, appearing to be from someone you know. Once you open the attachment on a vulnerable computer, it starts to run and can lock the files on your computer and network server without your knowledge.
05/23/2017 05:37 EDT
scyther5 via Getty Images

6 Tips To Build A Cyber-Security Culture At Work

Criminals take the path of least resistance. The weakest link is the employee. Data breaches are mostly the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report. The best way for organizations to protect themselves is to create and foster a culture of cyber security awareness.
05/15/2017 10:36 EDT
KrulUA via Getty Images

How Weakened Privacy Laws In America Affect Canadians

While Canadian ISPs cannot share customer information without their consent, Canadians regularly travel to the US and use WIFI or cellular data on electronic devices and computers. In cases where they use cellular data or WIFI via American ISPs, their personal information may be accessible. Selling customer data to third parties is how Google and Facebook make money. However, information collected by an ISP is much more detailed than what Facebook and Google collect.
04/12/2017 04:18 EDT
LDProd via Getty Images

Is Your Privacy At Risk Because You Use Apps?

Have you noticed how most people don't carry as many things as they used to while traveling? Things like flashlights, cameras, maps, memory sticks, newspapers, magazines, games and books. These items and others have all been replaced by smart phones and devices. While they make our lives more convenient and easier, they also collect information about us.
02/03/2017 07:28 EST
BRENDAN SMIALOWSKI via Getty Images

6 Reasons You Should Not Use A Private Email Server

In 2015, 205 billion email messages were sent and received daily, according to the Radicati Group. Messages are sent and received from computers, mobile, tablets and many other devices. The current U.S. election has seen Hillary Clinton's presidential race mired in an email scandal involving the user of a personal email server while she served as secretary of state from 2009 to 2013.
09/20/2016 01:43 EDT
tonymelony via Getty Images

5 Ways To Protect Your Organization From Ransomware

Ransomware is one of the fastest growing areas of cyber crime. The intended target is often small and medium sized businesses, because they have fewer resources compared with larger organizations. Historically, the root word ransom refers to a criminal demanding a payment in exchange for releasing someone or something that has been taken.
05/09/2016 06:43 EDT
John Lamb via Getty Images

6 Tips To Implement Cloud ERP properly

Enterprise resourcing planning software has lagged behind cloud computing solutions in other business areas like CRM and storage. Cloud ERP will grow in the next few years because large vendors like Microsoft, Oracle, and SAP are ramping up product offerings.
04/14/2016 03:26 EDT
RyanKing999 via Getty Images

5 Tech Trends For Small/Medium Businesses In 2016

As 2016 gets underway, organizations are searching for new ways to grow, compete, and win. They know technology will play a role. While it's impossible to have a crystal ball to predict the future, some key trends have emerged in the coming year that are relevant for small and medium-sized organizations. Here are five ones to watch.
01/19/2016 12:19 EST
maxkabakov via Getty Images

5 Password Strategies To Keep Intruders Out

At a time when most devices connect to the Internet, making it harder for intruders to gain access is essential. The number one way hackers access an online account is through stolen or misused credentials, according to the annual Data Breach Investigations Report from Verizon.
12/29/2015 05:52 EST