FSET Tech Talk

A person enters a passcode on a mobile phone, with a laptop in the background displaying a login screen—illustrating the importance of secure access and managed IT services for municipal government offices in Northwestern Ontario.
Featured Blog

A Guide to Implementing Multi-Factor Authentication

Strengthen Your Business Security with Multi-Factor Authentication (MFA) One of the most effective defenses is Multi-Factor Authentication (MFA). By adding a second (or even third) layer of identity verification, MFA makes it exponentially more difficult for bad actors to access your systems. Why MFA Matters A single stolen password can lead...
Read more

Recent Blogs

A Guide to Implementing Multi-Factor Authentication

Strengthen Your Business Security with Multi-Factor Authentication (MFA) One of the most effective defenses is Multi-Factor Authentication (MFA). By adding a second (or even third) layer of identity verification, MFA makes it exponentially more difficult for bad actors to access your...

Why Secure Data Backup Should Be a Priority

Protect Your Digital Assets with a Backup Strategy Now more than ever, data serves as the foundation of both personal and business operations. We depend on the availability and integrity of digital information across devices and systems. When that data...

Password Spraying

Understanding Password Spraying At FSET, we understand that modern cybersecurity threats are constantly evolving—and so must our defenses. One increasingly common tactic used by cybercriminals is password spraying, a stealthy form of brute-force attack that leverages weak or reused passwords...

Maximize Your Investment in Microsoft 365

Modern Tools. Secure Collaboration. Strategic Results Microsoft 365 offers a robust suite of productivity and collaboration tools designed to support secure, modern work environments across devices and platforms. With trusted applications like Word, Excel, PowerPoint, Outlook, and powerful cloud-first tools...

ISO/IEC 27001:2022 Certification 

FSET Achieves ISO/IEC 27001:2022 Certification  At FSET, we understand the importance of protecting your organization's sensitive information. That's why we're happy to share that FSET has upgraded our ISO/IEC 27001:2013 certification to the 27001:2022 certification, the world's best-known standard for...

How to Enhance Email Security

Simple Steps to Secure your Inbox Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more...

The Future of Password Policies

The Evolution of Password Policies and Why It’s Time to Go Passwordless For decades, organizations have relied on password policies to presumably keep systems and data secure. Over time, those policies have grown increasingly intricate, with requirements for longer passwords,...

Passwordless Authentication

Bringing Passwordless Authentication to Canadian Agencies, Municipalities and Companies   The cyber landscape is evolving rapidly, and passwords are no longer enough to provide ample security. Even multi-factor authentication (MFA) is increasingly vulnerable to sophisticated threats like phishing and intermediary attacks.  ...

The Role of Vulnerability Assessments for Cybersecurity

Strengthen Your Business's Cybersecurity Cyber threats are an ever-present reality for businesses of all sizes as hackers innovate and devise new ways to exploit vulnerabilities in computer systems and networks. A proactive approach to cybersecurity is essential, and one of...

The Cybersecurity Risks of Remote Work

Maximizing Productivity and Security in Remote Working Environments The remote work trend is more popular than ever. Working remotely offers employees flexibility and convenience. For employers, it translates into diminished office-related expenses. A notable perk frequently mentioned is the enhancement...
Back to top