FSET Tech Talk

Featured Blog

Why Secure Data Backup Should Be a Priority

Protect Your Digital Assets with a Backup Strategy Now more than ever, data serves as the foundation of both personal and business operations. We depend on the availability and integrity of digital information across devices and systems. When that data is compromised either through hardware failure, accidental deletion, or a...
Read more

Recent Blogs

Why Secure Data Backup Should Be a Priority

Protect Your Digital Assets with a Backup Strategy Now more than ever, data serves as the foundation of both personal and business operations. We depend on the availability and integrity of digital information across devices and systems. When that data...

Password Spraying

Understanding Password Spraying At FSET, we understand that modern cybersecurity threats are constantly evolving—and so must our defenses. One increasingly common tactic used by cybercriminals is password spraying, a stealthy form of brute-force attack that leverages weak or reused passwords...

Maximize Your Investment in Microsoft 365

Modern Tools. Secure Collaboration. Strategic Results Microsoft 365 offers a robust suite of productivity and collaboration tools designed to support secure, modern work environments across devices and platforms. With trusted applications like Word, Excel, PowerPoint, Outlook, and powerful cloud-first tools...

ISO/IEC 27001:2022 Certification 

FSET Achieves ISO/IEC 27001:2022 Certification  At FSET, we understand the importance of protecting your organization's sensitive information. That's why we're happy to share that FSET has upgraded our ISO/IEC 27001:2013 certification to the 27001:2022 certification, the world's best-known standard for...

How to Enhance Email Security

Simple Steps to Secure your Inbox Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more...

The Future of Password Policies

The Evolution of Password Policies and Why It’s Time to Go Passwordless For decades, organizations have relied on password policies to presumably keep systems and data secure. Over time, those policies have grown increasingly intricate, with requirements for longer passwords,...

Passwordless Authentication

Bringing Passwordless Authentication to Canadian Agencies, Municipalities and Companies   The cyber landscape is evolving rapidly, and passwords are no longer enough to provide ample security. Even multi-factor authentication (MFA) is increasingly vulnerable to sophisticated threats like phishing and intermediary attacks.  ...

The Role of Vulnerability Assessments for Cybersecurity

Strengthen Your Business's Cybersecurity Cyber threats are an ever-present reality for businesses of all sizes as hackers innovate and devise new ways to exploit vulnerabilities in computer systems and networks. A proactive approach to cybersecurity is essential, and one of...

The Cybersecurity Risks of Remote Work

Maximizing Productivity and Security in Remote Working Environments The remote work trend is more popular than ever. Working remotely offers employees flexibility and convenience. For employers, it translates into diminished office-related expenses. A notable perk frequently mentioned is the enhancement...

Leverage Microsoft 365’s New AI Innovations

Seamlessly Integrate Microsoft 365’s AI into Your Daily Work Generative AI has become the forefront of efficiency. Microsoft 365’s new AI features is helping to shape the future of work. The latest wave of AI technology enhancements across the Microsoft...
Back to top