https://tech-assist.ca/
Abby Bassie-Cripps from Tech-Assist talks about Cybersecurity for Startups
https://tech-assist.ca/safety.php
https://abidel.legalshieldassociate.com/en-ca
Cyber Security for Startups: Prevention and Preparation
Mary Scott from Business Riff discussed the importance of cyber security for startups with Abby Bassie Cripps from Tech Assist. Abby emphasized the need for proactive measures to prevent hacking, such as using antivirus software, a VPN, and a separate router. She also advised rebooting the system when signs of hacking are detected. Mary highlighted the potential for hacking and the importance of being prepared to handle it. Abby further explained that a separate router can be a valuable investment for cyber security, despite its cost.
Mary and Abidel discussed various methods to protect privacy and security online. Abidel recommended using a paid VPN, a secure browser like Brave, and a search engine like DuckDuckGo to keep browsing history private. They also discussed the pros and cons of using cloud storage versus external hard drives, with Abidel suggesting that external hard drives are safer in terms of privacy and security. Lastly, Abidel mentioned the use of browser add-ons to block bad ads and protect against server downtime.
Abidel discussed the concept of "pretenders" in the context of ad blockers, emphasizing that not all ad blockers are genuine. She also explained that the effectiveness of these blockers depends on various factors, including the user's location and the permissions on their computer. Mary asked for clarification on the differences between hacking, phishing, and spoofing, to which Abidel responded that hacking is a broad term encompassing various actions, including unauthorized access to a computer. She further explained that spoofing involves impersonating someone to gain access or information.
Abidel discussed the importance of verifying the authenticity of emails before opening them. She explained that emails with a lot of letters and numbers that don't make sense are likely from hackers trying to collect personal information. She referred to this as phishing. Abidel also advised against emptying the spam folder, as service providers periodically review these emails and create new rules to prevent them from being sent again. Mary confirmed her understanding of these concepts, including recognizing phishing attempts like emails with attached PDFs from unknown sources.
Mary and Abidel discussed the importance of personal logins for accessing websites and the use of password managers for generating secure passwords. Abidel recommended the Trend Micro package from Legal Shields, which includes a quality antivirus, VPN, and password manager. She emphasized the need for a 16-digit password with letters, capitals, numbers, and symbols for maximum security. Abidel also expressed her preference for password managers that are stored on the computer rather than in the cloud to avoid potential hacking risks