FSET Tech Talk

Featured Blog

Password Spraying

Understanding Password Spraying At FSET, we understand that modern cybersecurity threats are constantly evolving—and so must our defenses. One increasingly common tactic used by cybercriminals is password spraying, a stealthy form of brute-force attack that leverages weak or reused passwords to gain unauthorized access across multiple accounts.  Unlike traditional brute-force...
Read more

Recent Blogs

Password Spraying

Understanding Password Spraying At FSET, we understand that modern cybersecurity threats are constantly evolving—and so must our defenses. One increasingly common tactic used by cybercriminals is password spraying, a stealthy form of brute-force attack that leverages weak or reused passwords...

Maximize Your Investment in Microsoft 365

Modern Tools. Secure Collaboration. Strategic Results Microsoft 365 offers a robust suite of productivity and collaboration tools designed to support secure, modern work environments across devices and platforms. With trusted applications like Word, Excel, PowerPoint, Outlook, and powerful cloud-first tools...

ISO/IEC 27001:2022 Certification 

FSET Achieves ISO/IEC 27001:2022 Certification  At FSET, we understand the importance of protecting your organization's sensitive information. That's why we're happy to share that FSET has upgraded our ISO/IEC 27001:2013 certification to the 27001:2022 certification, the world's best-known standard for...

How to Enhance Email Security

Simple Steps to Secure your Inbox Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more...

The Future of Password Policies

The Evolution of Password Policies and Why It’s Time to Go Passwordless For decades, organizations have relied on password policies to presumably keep systems and data secure. Over time, those policies have grown increasingly intricate, with requirements for longer passwords,...

Passwordless Authentication

Bringing Passwordless Authentication to Canadian Agencies, Municipalities and Companies   The cyber landscape is evolving rapidly, and passwords are no longer enough to provide ample security. Even multi-factor authentication (MFA) is increasingly vulnerable to sophisticated threats like phishing and intermediary attacks.  ...

The Cybersecurity Risks of Remote Work

Maximizing Productivity and Security in Remote Working Environments The remote work trend is more popular than ever. Working remotely offers employees flexibility and convenience. For employers, it translates into diminished office-related expenses. A notable perk frequently mentioned is the enhancement...

What is Phishing?

The Rising Threat of Phishing Phishing is a form of cyberattack that uses carefully disguised and seemingly friendly methods to trick users into handing over their personal information. Phishers trick their targets into believing that they are trustworthy and are...
Back to top