Blog

Recent Blogs

Understanding Spoofing

How to Protect Yourself and Your Organization from Spoofing Cybercriminals are finding new ways to trick individuals and organizations into giving up sensitive information. One of the most common and effective tactics they use is spoofing. At its core, spoofing is...

Understanding AODA Compliance

What AODA Compliance Means for Your Website and Organization  In Ontario, the Accessibility for Ontarians with Disabilities Act (AODA) mandates that organizations make their services, spaces, and digital properties accessible to everyone, regardless of ability. For businesses, public sector organizations, and nonprofits,...

What ISO 27001 Means for Your IT Partner

Why Certification Matters When Choosing a Technology Provider  Whether you're a municipality, business, or nonprofit organization, your IT partner plays an important role in protecting sensitive information. That’s why it’s important to understand what credentials to look for in a...

Cybersecurity for Municipal Governments 

With the ongoing digitalization of municipal operations, the risks associated with cyber threats are growing rapidly. Recent cyberattacks on local governments serve as a reminder why municipal governments must prioritize cybersecurity and how they can strengthen their security.   The...

Password Spraying

Understanding Password Spraying At FSET, we understand that modern cybersecurity threats are constantly evolving—and so must our defenses. One increasingly common tactic used by cybercriminals is password spraying, a stealthy form of brute-force attack that leverages weak or reused passwords...

Maximize Your Investment in Microsoft 365

Modern Tools. Secure Collaboration. Strategic Results Microsoft 365 offers a robust suite of productivity and collaboration tools designed to support secure, modern work environments across devices and platforms. With trusted applications like Word, Excel, PowerPoint, Outlook, and powerful cloud-first tools...
Back to top