FSET Tech Talk

Nicole Brown and Allison Mayne - FSET Inc.
Featured Blog

ISO/IEC 27001:2022 Certification 

FSET Achieves ISO/IEC 27001:2022 Certification  At FSET, we understand the importance of protecting your organization's sensitive information. That's why we're happy to share that FSET has upgraded our ISO/IEC 27001:2013 certification to the 27001:2022 certification, the world's best-known standard for information security management systems (ISMS). It defines the requirements for...
Read more

Recent Blogs

ISO/IEC 27001:2022 Certification 

FSET Achieves ISO/IEC 27001:2022 Certification  At FSET, we understand the importance of protecting your organization's sensitive information. That's why we're happy to share that FSET has upgraded our ISO/IEC 27001:2013 certification to the 27001:2022 certification, the world's best-known standard for...

How to Enhance Email Security

Simple Steps to Secure your Inbox Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more...

The Future of Password Policies

The Evolution of Password Policies and Why It’s Time to Go Passwordless For decades, organizations have relied on password policies to presumably keep systems and data secure. Over time, those policies have grown increasingly intricate, with requirements for longer passwords,...

Passwordless Authentication

Bringing Passwordless Authentication to Canadian Agencies, Municipalities and Companies   The cyber landscape is evolving rapidly, and passwords are no longer enough to provide ample security. Even multi-factor authentication (MFA) is increasingly vulnerable to sophisticated threats like phishing and intermediary attacks.  ...

The Role of Vulnerability Assessments for Cybersecurity

Strengthen Your Business's Cybersecurity Cyber threats are an ever-present reality for businesses of all sizes as hackers innovate and devise new ways to exploit vulnerabilities in computer systems and networks. A proactive approach to cybersecurity is essential, and one of...

The Cybersecurity Risks of Remote Work

Maximizing Productivity and Security in Remote Working Environments The remote work trend is more popular than ever. Working remotely offers employees flexibility and convenience. For employers, it translates into diminished office-related expenses. A notable perk frequently mentioned is the enhancement...

Protecting Your Business from Cyber Threats 

Understanding Ransomware To fight against ransomware effectively, it’s crucial to understand its nature. Ransomware is malware that encrypts a user’s data, making it inaccessible. The attacker then demands a ransom in exchange for the decryption key. This digital ramification can...

Leverage Microsoft 365’s New AI Innovations

Seamlessly Integrate Microsoft 365’s AI into Your Daily Work Generative AI has become the forefront of efficiency. Microsoft 365’s new AI features is helping to shape the future of work. The latest wave of AI technology enhancements across the Microsoft...

How a Data Breach Can Cost Your Business for Years

In the digital age, data is the lifeblood of businesses. It fuels operations, decision-making, and customer interactions. But there is a dark side to the data-centric landscape: the persistent threat of data breaches. Now more than ever, cyber security readiness is necessary...

What is Phishing?

The Rising Threat of Phishing Phishing is a form of cyberattack that uses carefully disguised and seemingly friendly methods to trick users into handing over their personal information. Phishers trick their targets into believing that they are trustworthy and are...
Back to top