Protecting your Business Data

In conducting your daily business, you deal with a lot of sensitive information. From customer credit card numbers to personal information, financial records, and intellectual property, there is a lot of private data that you wouldn’t want to fall into the wrong hands. Unfortunately, digital thieves can target your business and attempt to steal this valuable information. Keep your business data safe with these steps:

Security Audit

The first step in protecting your business is to be aware of vulnerabilities in your security structure. We can audit your IT infrastructure and identify any weaknesses in your computer systems and network, which can possibly be susceptible to a security attack. Once identified, we can take measures to correct these weaknesses and protect the integrity of your IT infrastructure.

Staff Education

Human error is the main cause of security breaches as far as private data is concerned. To help, it is important that you educate your staff to stay vigilant and avoid slip-ups that can compromise your private business data. Remind employees, consultants, vendors, and anyone involved in the transmission of information to always be attentive and cautious at every stage of the process. From putting a password on mobile phones to not sharing confidential information with outsiders, educate your staff to do everything they can to minimize human error.

Stronger Passwords

A strong password is more than eight characters long, does not include your name, company name, or a dictionary word. It should contain a combination of uppercase and lowercase letters, numbers, and symbols. Come up with a phrase that is easy to remember for you but unknown to anyone else, and then create an acronym or substitute symbols for letters. Reset passwords on a regular basis and use multiple passwords.

Create Back Ups

We can protect your business data with on-site and off-site backup services. Should your hardware be compromised by a security attack or virus, you could lose all your data. Creating a backup is the best insurance policy for protecting all of your valuable data.

Data Encryption

If data happens to be stolen or fall into the wrong hands, it could be bad news. If you have encrypted the data, however, they can’t access the cyphered information. Grade A encrypts all backup data and stores with the safe and secure onsite and offsite storage.

We will work with you to assess your current security status, identify weaknesses, and patch any vulnerabilities. Nothing is more important than keeping your business data safe and secure, and this is our priority.

Free Mini-Ebook: The Two Minute Intro to Technology for Law Firms

Legal Practice Management Software can offer your firm an abundance of benefits, including improved time management, faster document retrieval, organization and more. If your law firm is just starting to consider using a legal software solution, you might be overwhelmed with all of the options on the market.

Download our free mini-ebook for some of our top tips to keep in mind when searching for the right legal software. This mini-ebook covers the following topics:

  • Pricing Structure
  • The Cloud
  • Accounting Integration
  • Reports and Dashboards

Download The Two Minute Intro to Technology for Law Firms!

What Can We Learn from the Celebrity Photo Hack When It Comes to Cloud Security?

Ok, so most of us might not keep our nude pictures in the Cloud, but what the recent celebrity photo hack has taught us is that a username and password alone won’t necessarily keep your data safe.

Around 100 celebrity accounts in Apple’s iCloud had their information stolen. Their username and passwords were used to access the accounts, indicating most of these individuals had weak login credentials that the hacker’s computers could easily guess. So, as we increasingly add private data to our Cloud services, how do we protect ourselves?

Choose a Password That’s Hard for Computers to Guess

Replace an ‘o’ with a zero or an ‘a’ with an ‘@’ symbol and you’re good right? Not exactly. This little cartoon gives a good depiction of the typical dilemma; we tend to use passwords that are hard for humans to remember but easy for computers to guess.

Password Cartoon


Rather than focus on shorter cryptic passwords use a longer combination of random words that are easy to remember.

Use Two Stage Authentication with Your Cloud Services

Two stage authentication (or two factor in the IT industry) means that when you log into a website with your username and password you will also be forced to enter another code, typically one sent to your cellphone via text message or with an app. This will prevent people from logging into a website with your account even if they have your username and password. Google, Apple and Microsoft Live / Microsoft Office 365 support the process.

Extra security means a little more process and irritation when using Cloud services, but in the end it will save you from airing your dirty laundry all over the web.

Post by Mathew Lafrance, President, Grade A

“What Is A Hybrid Cloud And How Can It Help My Nonprofit Organization?” Featured on TechSoup Canada

We’re excited to announce that we were recently featured on TechSoup Canada’s blog!

TechSoup Canada Blog

“There is no doubt about it, the Cloud has entered the nonprofit sector and it is here to stay. With key benefits such as scalability, flexibility and cost efficiency, the Cloud introduces a whole new way for nonprofit organizations (NPOs) to conduct business. While there is still a lot of uncertainty surrounding this relatively new technology, we are excited to see an increasing number of NPOs embrace rather than resist the Cloud.

As a managed IT services provider, we think that it is important for our clients to be as informed as possible when it comes to their business technology. Often, when we first meet NPOs who are interested in migrating to the Cloud, the most common question we hear is, “where do I start?” With so many options on the market, the choices can be overwhelming – should NPOs choose a Public Cloud, a Private Cloud or a combination of both? In this article, we will address this question as well as introduce the idea of a Hybrid Cloud for NPOs.” – Justin Sharp, Solutions Architect, Grade A

Visit TechSoup Canada’s blog to read the full article.

Like Us on FacebookLike Us on FacebookLike Us on Facebook