Business Security During the Holidays: A Tech Guide by WildFrog Systems in Abbotsford

The festive season is upon us,

and as we embrace the holiday spirit, it's crucial for businesses to remain vigilant against the heightened threat of cyber attacks. WildFrog Systems, your local IT experts in Abbotsford, are here to guide you through the potential risks and provide an action plan to ensure your business keeps thriving over the holidays.

Understanding the Risks

The holiday season witnesses a surge in cyber attacks for several reasons. First and foremost, the increased prevalence of online shopping creates a breeding ground for malicious activity. Cybercriminals capitalize on the influx of transactions, seeking to exploit vulnerabilities in the e-commerce infrastructure.

Moreover, the relaxed atmosphere during the holidays contributes to a lax approach towards cybersecurity. Employees, caught up in the festivities, may forget to maintain essential security measures, such as backups and software updates. This oversight can leave businesses susceptible to attacks that exploit unpatched vulnerabilities.

Lastly, the holidays present an opportune time for cybercriminals to strike as companies are often more willing to pay ransoms. Many industries rely heavily on this time of the year, and the pressure to maintain operations during the festive season can lead to a higher likelihood of succumbing to extortion demands. Cybercriminals recognize the urgency and may target companies knowing that the cost of downtime during the holidays is often far more significant than the ransom requested.

Common Holiday Cyber Attacks

Understanding the common types of cyber attacks prevalent during the holidays is key to developing a robust defense strategy.

Phone Call Phishing (Vishing): Cybercriminals may employ tactics such as vishing, where they impersonate legitimate entities over the phone, attempting to extract sensitive information. It's essential to educate employees about the importance of verifying the identity of callers, even if they seem familiar.

Ransomware Attacks: Ransomware is a significant threat during the holidays. Malicious software encrypts files, rendering them inaccessible until a ransom is paid. Regular backups and a proactive cybersecurity stance are crucial to mitigating this risk.

Password-Reset Attacks: Cybercriminals may attempt to exploit password vulnerabilities, gaining unauthorized access to critical accounts. Implementing robust password policies and multi-factor authentication can add an extra layer of protection.

Securing Your Company's Workstations

To safeguard your business during the holidays, here are some practical tips:

Voice Authentication Caution: With technology now capable of mimicking voices convincingly, it's crucial to exercise caution when receiving calls requesting sensitive information.

Secure Online Shopping: Avoid using public Wi-Fi for online shopping, and always verify that the websites you visit have a secure connection.

Maintain Backups and Updates: Regularly backup your data and ensure that software and security updates are consistently implemented, even during the holiday season. This is also important because of the number of power outages we experience in the Fraser Valley over the winter. Read about how to prepare HERE, and why it is important to prepare HERE.

Consistent Security Policies: Apply the same level of caution and security policies when working remotely or on mobile devices as you do in the office. Here’s a helpful blog post on the importance of keeping kids away from your work phone, which is applicable to all the time spent with family over the holidays!

Employee Training: Equip your team with the knowledge to identify phishing attempts and scams, fostering a cybersecurity-aware workplace culture. We wrote a helpful blog post on how to spot phishing emails HERE.

If you have not yet addressed business IT vulnerabilities, check out this blog post HERE to get started on identifying and implementing those before the holiday season.

Optimizing Security in Abbotsford, Chilliwack, and Langley

As your local tech support in Abbotsford, WildFrog Systems emphasizes the importance of integrating these security measures into your business practices. By adopting a proactive approach, you can ensure that your company remains resilient against cyber threats throughout the holidays. Having a local IT Service provider such as ourselves is critical in responding to emergencies as quickly as possible, minimizing damages to your business. If your IT provider is far away and has slow response times, now may be the time to switch to safeguard your business over the holidays.

Remember, safeguarding your business is not just a seasonal endeavour but an ongoing commitment to protecting your business. For comprehensive tech support and cybersecurity solutions in Abbotsford, Chilliwack, and Langley, trust WildFrog Systems to keep your business secure all year round.

Stay safe, stay secure, and have a happy holiday season!

WildFrog Systems - Your Trusted Partner in Tech Security

Risk Profiles Exposed: Business Vulnerabilities in Abbotsford, Chilliwack, and Langley

Thriving with new and growing businesses, Abbotsford is at high risk for cyber attacks. As a cyber security company nestled in the heart of Abbotsford, BC, we've helped companies recover from these attacks, and safeguarded them from future attacks. Over the year’s we’ve identified and worked to understand the vulnerabilities any given business may have, so we can work to protect and care for our neighbour businesses.

The Profile of Businesses at Risk

1. Incomplete Backup Documentation

In Abbotsford's competitive business scene, overlooking documentation for backups is a common pitfall. Imagine a scenario where critical data is lost, and your last line of defence, the backup, fails to restore your business. Our Business IT Services ensure that your backup procedures are well-documented, regularly updated, and seamlessly integrated into your operations.

2. Excessive Administrator Accounts

More isn't always merrier, especially when it comes to administrator accounts. An excess of such accounts exposes your organization to unnecessary risks. Restrict access, employ the principle of least privilege, and regularly audit and revoke unnecessary administrator permissions. WildFrog's Business IT Services streamline access control, employing the principle of least privilege to minimize the risk associated with excessive administrator accounts.

3. Neglecting Server Maintenance

Servers are the backbone of your digital infrastructure, and neglecting their maintenance leaves the door wide open for cyber threats. Regularly update and patch servers to shield them against known vulnerabilities, reducing the likelihood of exploitation. Our IT experts specialize in server maintenance, ensuring your systems are regularly updated and patched to mitigate vulnerabilities.

4. Absence of Anti-Ransomware Software

The threat of ransomware looms large in Abbotsford. A robust anti-ransomware solution acts as a barrier, ensuring your business remains resilient in the face of evolving threats. Our Business IT Services include robust anti-ransomware solutions, providing a shield against extortion attempts.

5. Ignoring Offsite Backups

Storing all your backups in one basket makes you susceptible to catastrophic data loss in case of physical disasters or targeted attacks. Secure your digital assets by implementing offsite backups, safeguarding your organization's continuity. Our IT services extend beyond conventional boundaries, implementing secure offsite backups to protect your critical data from unforeseen events.

6. No Anti-Phishing Protection

Phishing remains a predominant method for cybercriminals to infiltrate organizations. Arm your employees with the right tools by implementing anti-phishing protection for email, fostering a secure digital communication environment. Our Business IT Services include cutting-edge anti-phishing protection for emails, creating a secure communication environment for your business.

7. Neglecting Backup Monitoring and Testing

Having backups is only half the battle won. Regularly monitor and test your backups to ensure they are functional and can be restored promptly when needed the most. Our IT services ensure proactive monitoring and regular testing of backups, providing you with the confidence that your data can be restored when needed.

8. Unaudited Remote Access Tools

Leaving remote access tools unaudited is an open invitation to cyber threats. WildFrog Systems conducts regular reviews and audits of these tools as part of our comprehensive Business IT Services, securing your digital entry points.

Take Action Now!

Don't wait for a cyber crisis to strike. Safeguard your business today by reaching out to WildFrog Systems for a free consultation. Our tailored solutions will empower your organization to thrive securely . Contact us now, and let's build a robust cybersecurity strategy together.

North American Industrials: Top Target for Cyber Attacks | Abbotsford IT Support

In September of this year, ransomware attacks reached an unprecedented peak, and the industrial sector emerged as the primary bullseye for cybercriminals.

Astonishingly, 40% of the 514 reported attacks were directed at industries within the industrial sector, such as those in construction and engineering. Next up were consumer cyclicals, including businesses in the media, hotel, and retail sectors. The current trajectory suggests that 2023 is poised to shatter previous records, as September alone witnessed a staggering 153% surge compared to the same period in the previous year. (Source: NCC Group)

Understanding Why Industrial Industries in Abbotsford and the Surrounding Area Are Prime Targets for Cyber Attacks

Industrial and manufacturing companies are being targeted for cyber attacks due to several key factors. Firstly, these sectors store valuable intellectual property like designs and drawings, sensitive customer specifications, and databases that can be rapidly encrypted, downloaded, and held hostage for ransom. Moreover, the complex supply chains within the industrial domain provide numerous entry points for cybercriminals to exploit vulnerabilities. As technology and automation continue to advance in local cities like Abbotsford, the attack surface grows, making it essential for businesses in the area to prioritize cybersecurity measures. Local industries need to recognize these evolving threats and work with experienced IT partners to safeguard their operations.

WildFrog Can Help Your Fraser Valley Business Stay Cyber Secure

The current cyber threat universe is more hostile than ever, warranting cause for concern. However, with the right IT partner by your side, you can fortify your defenses and protect your business from potential threats. At WildFrog Systems, we are committed to safeguarding local businesses and helping them thrive in an increasingly digital world. Don't hesitate to reach out to us for a personalized cybersecurity assessment and tailored solutions. Together, we can secure our local industries and ensure a brighter, safer future.

Keep Your Money Safe: A Guide to Secure Online and Phone Payments | IT Services Abbotsford

The ability to pay for services online and over the phone has revolutionized the way small businesses operate. However, amidst the convenience, it is imperative to prioritize security when making these payments.

At WildFrog Systems, our commitment extends beyond safeguarding your data.

Our mission is to empower local businesses. However, we have observed that financial data is sometimes handled without sufficient caution. In this guide, we will discuss some less secure online payment methods and provide practical tips to help you ensure the security of your money.

Unsafe Payment Practices:

1. Don’t Leave Credit Card Details on Voice Messages

Leaving sensitive payment information on a voice message may seem like a quick way to check paying a bill off your list if the payee is not available at the same time as you, but it poses significant security risks. Voice messages can be accessed by unauthorized individuals. Many companies use VoIP (Voice Over Internet Protocol) systems which are cloud-based and thus could be compromised if any intruder gained access to their work devices or accounts. Additionally, voice messages can easily be forwarded or shared unintentionally, further compromising your information.

2. Don’t Send Credit Card Details in Emails

Emails are not as secure as they may appear. When you send credit card details through email, the information may be transmitted over the internet in plain text, making it vulnerable to interception by cybercriminals. Email accounts can also be compromised, allowing unauthorized access to your sensitive data. This is the case for social media as well. As a result, email (and social media) should never be used as a method for sharing credit card information.

3. Be Aware of Unsecured Websites:

It is important to remain cautious when making payments on unfamiliar websites. Ensure that the website's URL starts with "https://" and features a padlock symbol in the address bar, indicating a secure connection. Also, make sure that you go to the payee’s official website. If hackers were to imitate the company you are trying to pay, they could send you a look-alike link to a website for payment. If you are unsure, reach out to the company directly to verify the payment link or method is to their company.

4. Don’t Trust Public Wi-Fi Networks:

Refrain from conducting financial transactions over public Wi-Fi networks, which are inherently insecure, and are usually not encrypted. Do not ever assume they are safe, especially not in airports. Hackers can exploit vulnerabilities in these networks to intercept your data. Instead, use your phone’s personal hotspot through your data plan if you need to send money over the internet while you are away from your home or office.

Secure Payment Practices:

1. Paying Over the Phone

When making payments over the phone, follow these secure practices:

  • Call The Public Business Phone Number: Always be the one to dial the number, do not rely on callback numbers or numbers from invoices or emails to make payments.

  • Verify Identity: Ensure you are speaking with a legitimate representative of the business or organization. Ask for their name, title, and contact information, and independently verify their identity before providing payment details.

  • Be Alert: Always pay attention and ask questions when a company’s phone number changes.

  • Never Share Full Details: Only share the necessary payment information, such as the card number and expiration date. Avoid sharing sensitive details like the CVV code unless absolutely required.

2. Paying by Cheque

Paying by cheque remains a reliable method for many businesses.

  • Use Secure Cheque Stock: Invest in high-security cheque stock with features like holograms, watermarks, and microprinting to deter fraud.

  • Mail Securely: When sending cheques by mail, use a secure and traceable method. Consider using registered mail or a courier service.

  • Review Statements: Regularly review your bank statements to detect any unauthorized or suspicious cheque transactions.

3. Paying Online

When making online payments, whether to vendors or customers, adhere to these secure practices:

  • Use Reputable Payment Gateways: Utilize well-established and secure payment gateways that employ advanced encryption methods to protect your financial information during transactions.

  • Implement Multi-Factor Authentication (MFA): Enable MFA on your online payment accounts to add an extra layer of security, requiring multiple forms of verification before granting access.

  • Regularly Update Software: Keep your computer and mobile device software up to date. Manufacturers release updates to address security vulnerabilities, ensuring a safer online experience.

  • Educate Your Team: Train your employees about secure online payment practices, recognizing phishing attempts, and reporting suspicious activity promptly.

Premier Business IT Services Based in Abbotsford, BC

Investing in secure payment practices not only shields your financial transactions but also fortifies the trust of your valued customers. The experts at WildFrog Systems are always ready to help you embrace these safeguards, ensuring the protection of your business and the satisfaction of your clientele. You’re always welcome to call us at 604 210 9811 or to contact us by filling out this form.

Keep Your Kids Away from Your Work Phone! | Abbotsford, Langley and Chilliwack IT Support

Hello from the WildFrog Systems team, serving Abbotsford, Chilliwack, and the surrounding area!

Pokemon go on a phone

Our dedication to your business goes beyond typical IT services. We're genuinely invested in your success, which is why we're delving into the vital topic of securing your work devices outside the office.

Many of us have our work emails and documents on the same phone or laptop that our kids want to play games or watch Youtube on.

In today's world, work and family life frequently intertwine, but this comes with a grand collection of security risks. In this blog post, we’ll equip you with practical tips to safeguard your data anytime, anywhere.

1. Data Security

Data security is a critical cornerstone of your company, and its important to treat what appears to be small risks with utmost seriousness. Work devices serve as vaults for sensitive company data, client records, and exclusive software. Allowing your children access to these devices heightens the risk of unintentional data breaches, potentially jeopardizing your Abbotsford-based business's invaluable information.

2. Malware Threats and Phishing Vulnerabilities

Cyber threats are ever-present, and young kids usually lack the experience to spot phishing emails or harmful links, making them an easier target for malware. Once malware finds its way into your work device, it can disrupt operations and damage your company's reputation.

3. Unauthorized Access and Local Compliance

Adhering to local regulations can be easy to forget on personal devices, and in a remote work environment. Allowing children to use work devices might lead to unauthorized usage and breaches, which could carry legal consequences. Adhering to regional data protection laws is indispensable for your business's health and reputation.

4. Ensuring Business Continuity in Chilliwack

In the Fraser Valley’s increasingly competitive business landscape, maintaining seamless operations is a top priority. Unintentional misuse of work-related apps or data by children can disrupt processes, potentially impacting business continuity.

Recommendations from the Experts at WildFrog Systems:

  • If you can, maintain separate work and personal devices to prioritize data security.

  • Implement robust password policies, so kids may not know the passwords to devices that contain sensitive information.

  • Enable multi-factor authentication for all for all company logins.

  • Educate your children about cybersecurity best practices, such as how to recognize phishing attacks.

  • Lock work devices and accounts when not in use to prevent unauthorized access. Enable automatic screen lock in case you forget or get caught up when you leave your desk or device.


As always, feel welcome to contact us today for expert IT services tailored to your business's unique needs by calling 604 210 9811 or filling out this form.

From Pond to Progress: The Unexpected Tech Influence of Frogs! | Abbotsford IT Company

Some of you may have seen our logo and wondered to yourselves, “what does a frog have to do with technology?”.

To be honest, we didn’t choose the frog logo because frogs are revolutionizing the industry. That being said, frogs have made some pretty cool contributions to the advancement of technology that we thought we’d share!


1. Frog-Inspired Robot Limbs

Researchers were inspired by the incredible jumping ability of frogs to create more agile and efficient robots. Frogs can leap up to 20 times their body length, and engineers thought, "Why not make robots that can do the same?" So, they did! These robot limbs mimic the way frogs' leg muscles work and are now used in everything from search-and-rescue missions to exploring the depths of the ocean.


2. Frog Skin and Smartphone Screens

Scientists have been studying the texture and properties of frog skin to develop self-cleaning and water-repellent materials. Frog skin is naturally resistant to dirt and water, and research findings have been used to help create smartphone screens that resist fingerprints and water damage. So, the next time you see a frog, thank it for helping you take those perfect selfies in the rain.


3. Frog Calls and Data Transmission

Now, here's a tech-frog connection that might really surprise you. Frogs communicate using a variety of sounds and calls, and their unique abilities have inspired researchers to improve data transmission methods. Frog calls are complex and can travel long distances underwater, which made scientists think, "Hmm, maybe we can use this idea for something other than attracting potential frog dates." And they did! The concept of using sound waves for data transmission has led to innovations like underwater communication systems and even data transfer in noisy environments.


So, the next time you see a frog hopping around in your garden or croaking by the pond, remember that these little amphibians aren't just masters of the swamp—they're also silent contributors to the world of technology.


If you are a business in the Fraser Valley and are looking to upgrade your tech support, always feel welcome to reach out for a free quote at 604-210-9811 or by filling out this form.

MFA Fatigue: The Sneaky Hacker Trick That's Like a Persistent Fly

Hacker Fly holding an iphone and headset

Hacker Fly, Designed by Author using Midjourney

Picture this: you're chilling out, sipping a cup of coffee, watching Youtube on a sunny Saturday morning. Suddenly, your phone buzzes with a notification. "Great," you mumble, having expected a fun meme or a heartwarming message from a friend.

But alas, it's just another MFA code, staring back at you like an insistent fly that just won't buzz off.

You scratch your head and wonder, "Did I really request this code again?"

You didn’t.

Hackers are hiding behind a digital bush, waiting for you to mindlessly tap "Approve" just to swat the message away and get back to watching Good Mythical Morning. You might think you’re nimble enough to wiggle out of this attack.

You’re not.

Imagine now that it’s the middle of the night. You are sleeping, dreaming about going to the Bahamas with your cat, Gerald. Your phones buzzes. And buzzes. And buzzes. In your best morning voice, you croak out a few curse words and finally pick up your phone, click whatever button looks like it will let you and Gerald drift back off to the Bahamas, and close your eyes.

Even the best of us could fall for that one. Catch any one of us in a weak moment and we could be toast.

MFA (Multi-Factor Authentication) fatigue is a pesky hacker technique that’s main attack is being annoyingly persistent. It's like being stuck in an endless loop of verification pop-ups. Approve, deny, approve, deny – you start to wonder if you're trapped in a digital Groundhog Day. But fear not, there's a simple antidote to MFA fatigue: mindfulness.

Pause, take a breath, and ask yourself if you initiated this request. It's like donning a helmet to protect yourself from that pesky fly buzzing around your head.

For real though, there is a more practical thing you can do so that you don’t have to channel your inner Zen master, and protect your digital kingdom, fighting off an army of authentication messages at midnight:

Tech master made by AI

Switch your accounts to use MFA methods that require a code entry instead of just a verification click. That way, your account will only be accessed by whoever has access to the authentication app or email address or phone number that the code is sent to. In other words, by you.

Also, never ever re-use passwords (that way, if your password is guessed for one platform, they will not immediately have access to anything else).

We want you to enjoy your coffee with Rhett and Link in peace. If you manage a local business and have any questions about cybersecurity, or would like a free quote for our managed services, you are always welcome to reach out using this form.