Profile cover photo
Profile photo
Sentryon IT Solutions
4 followers -
Affordable technology solutions for small business.
Affordable technology solutions for small business.

4 followers
About
Posts

Post has attachment
Don’t give social media hackers a chance - Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don’t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make sure all your computing devices lock the moment you stop using them. This way, you are safe from the simple...
Add a comment...

Post has attachment
Get your business noticed using social media - As a startup business owner, you may think social media isn’t worth the effort because no one knows about your business. You may have dabbled in Twitter, Facebook, or LinkedIn and seen minimal (if any) results. What can a business owner with a new brand/product do? Well, it turns out quite a lot. And to prove it, here are tips everyone can learn from. #1 Prove you’re an expert It’s important to know everything there is about your product/brand,...
Add a comment...

Post has attachment
The Risk of Not Having Cloud Backup - It is always better to be safe than sorry. And given the fact that files can disappear or be corrupted in an instant, small businesses need robust data backup systems in place. Without one, you could very well lose lots of money and have your hard-earned reputation irrevocably damaged. How should you go about choosing a cloud backup provider? Let’s take a look: Learn more about their storage capacity Before partnering with a cloud backup provider, ask t...
Add a comment...

Post has attachment
How HIPAA Impacts Social Media Usage - Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization. On April 14, 2003, the "Health Insurance Portability and Accountability Act" (HIPAA) became law with the goal of protecting the privacy of patient medical re...
Add a comment...

Post has attachment
Our CEO, Geoff Anderson, will be speaking about cyber-security at the Toronto Entrepreneurs conference on May 9th at the Mississauga Convention Centre. For more information visit https://www.torontoentrepreneurs.ca/ #TEConf #Cybersecurity
Add a comment...

Post has attachment
The Facebook data breach scandal explained - Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn't guard the information you've given it? How does this affect its users? Last month, news broke that a firm known as Cambridge Analytica collected private data from over 50 million Facebook users. The British company supposedly used this information in 2016 to influence voter beha...
Add a comment...

Post has attachment
Mobile devices in the field - Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes in. Here’s how to ensure connectivity for these workers. The ability to manage the workforce out in the field requires a modern support infrastructur...
Add a comment...

Post has attachment
Beware of watering hole attacks! - Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering hole attacks? Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect po...
Add a comment...

Post has attachment
3 Surprising applications of blockchain - Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange -- see for yourself! What is blockchain? Blockchain, like the cloud, is more of a concept than a specific piece of software or hardware. It’s the idea that if you store a spr...
Add a comment...

Post has attachment
3 ways to ensure your FB data is private - The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private. Download your Facebook data The thought of a complete stranger going through your account is pretty disturbing. Yet, you’re probably curious abou...
Add a comment...
Wait while more posts are being loaded