HUB TechMinutes

Business technology news, tips and events.

HUB TechMinutes

Better business through better information.

Here Are Some Hacks You Should Be Cognizant Of

In today’s modern business environment, your organization faces untold danger. There are several threats out there that your organization’s users could fall prey to. We’ve put together a list of some of the most dangerous ones out there, as well as how your business can respond to them.

Continue reading
  141 Hits
  0 Comments
141 Hits
0 Comments

How to Turn a Security Risk into a Security Solution

Let’s face it; the office isn’t the most engaging place at all times. Repetitive tasks can make attention to detail difficult to maintain. While this might throw a wrench into operational plans, it’s not the end of the world. A major threat like ransomware, on the other hand, could be a business-ender. When a lack of engagement meets security issues, you create a whole other monster that could strike your business when you least expect it.

Continue reading
  169 Hits
  0 Comments
169 Hits
0 Comments

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Continue reading
  203 Hits
  0 Comments
203 Hits
0 Comments

Phishing Attacks and How to Thwart Them

For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defences, there was no end to the devastation a hacker could cause inside a network.

Continue reading
  308 Hits
  0 Comments
308 Hits
0 Comments

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

Continue reading
  185 Hits
  0 Comments
185 Hits
0 Comments

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

25 March 2019
We’re not overestimating the importance of vendors by stating that they are literally what make your business work. The company that provides your Internet service, or the software you use to track your employees’ workflow, enables you to get work do...
22 March 2019
Today’s business has to be concerned about more variables than ever. Companies that depend on their supply chain, and those that distribute goods, need to be able to rely on their management to coordinate efficient and effective business. In the past...
18 March 2019
It’s no secret how useful the Google Chrome browser is to a user. What is a secret, however, is that Chrome has some added capabilities that make it even more useful than first impressions would suggest. For our Tip of the Week, we’ll review some of ...