Welcome Gabriela (Gaby) Loewen – Payroll Coordinator!
Please join me in welcoming our newest team member: Gabriela Loewen – Payroll Coordinator!
Please join me in welcoming our newest team member: Gabriela Loewen – Payroll Coordinator!
Staying a step ahead of cyber criminals is one of the best ways to embody the spirit of Generation Cyber Safe. Let’s look to Gen X for guidance on this one: they know it’s one of the easiest ways you can avoid online threats, especially in professional settings where the stakes are high. In fact, 59% of Gen X business owners say their company files are backed up regularly.
Let’s dive into how you can follow in their footsteps and be proactive about online threats as part of Generation Cyber Safe.
Schedule and automate backups
In the event of a cyber attack like ransomware , backups are your first line of defence against losing data. Set up automatic backups on your personal and business devices to ensure that your data is always saved somewhere safe. Schedule these backups to run regularly to maintain updated copies of your critical information.
It’s equally important to test your back ups regularly to make sure they can be restored without issues. Make it a habit to verify that your backups are working correctly and that you can recover your data when needed.
Store data safely
Whether you use cloud storage , external hard drives or a hybrid approach, finding one or more ways to store data that works for you is an important part of protecting your information. Cloud storage offers easy accessibility, while physical storage provides a secure offline backup. Consider your needs and choose the best combination to keep your data protected.
Make your business more cyber safe
Informing yourself and your team about cyber security threats and best practices is essential. Regular training sessions can help everyone recognize and respond to cyber threats like phishing and ransomware. Make use of resources such as online courses, workshops and webinars to stay informed about the latest cyber security trends and techniques.
Having an incident response plan is important for any small or medium business. Make sure your incident response plan includes the processes and procedures to follow to detect, respond and recover from a cyber incident . Regularly update and test your response plan to make sure it works for you.
Remember that remote or hybrid work introduces additional cyber security challenges. Ensure employees use secure Wi-Fi connections, a virtual private network (VPN) and follow company your cyber security plan when working remotely. Provide them with the necessary tools and training to maintain a secure work environment regardless of their location.
Conclusion
Being proactive in your cyber security practices is all about awareness and being prepared to respond effectively. By securing your backups and maintaining good cyber security, you can protect yourself and your business as a member of Generation Cyber Safe!
It is with mixed emotions that we announce the retirement of our friend and colleague, Marie Ponting, after 20 incredible years of dedicated service to Menno Place. While we will miss her, we are excited for her as she embarks on this new chapter of her life.
Marie has poured her the heart and soul into her work and is known not only for her exceptional professionalism but also for her warmth and welcoming smile. Whether answering questions or guiding us through complex payroll processes, Marie has always approached her work with joy and competence.
Over the years, Marie has held several positions: Payroll Coordinator for Menno Place, Accounts Payable for Menno Place, and Accounting Coordinator at Menno Hospital.
Please join us in acknowledging Marie’s remarkable career and wishing her all the best in her retirement. Feel free to reach out to Marie with an email or a call to congratulate her. Marie’s last day at work will be Friday, November 8th.
Thank you, Marie, for your unwavering dedication and the joy you have brought to our lives. We wish you endless happiness and new adventures in this exciting new chapter!
You can see some of Marie’s on campus adventures here:
To: All Regular HEU & Employee’s Association Members – Menno Home
From: Staffing
Date: October 18, 2024
Re: 2025 Vacation Requests
—
First Choice Vacation Requests:
Second & Subsequent Vacation Requests:
Please Note:
Thanks,
Staffing Home
A strong fall storm system will direct an atmospheric river towards the South Coast, bringing heavy rain to the region. Rain is expected to begin early in the day on Friday and continue into Sunday morning.
Andy Capesinio shared a devotional on Matthew 6:9-13, the Lord’s Prayer, and asked, “Why do we pray?”
October is Occupational Therapy Month and Health Care Assistant Appreciation day is Friday Oct 18th.
Let’s celebrate with soup, buns & dessert for everyone!
Effective immediately, Nik Van Egdom’s title has been changed from Manger of Housekeeping and Laundry to Manager of Environmental Services.
Something all generations have in common is the desire to stay connected. When it comes to being online, however, there are a lot of threats like phishing that can make staying social difficult. Need help staying secure? Millennials can help – in fact, 82% of this generation is confident in knowing how to identify a phishing email or malicious link ! Here’s a glimpse of what we’re covering in week three to help you become part of Generation Cyber Safe.
Phishing
Phishing is a common tactic that cyber criminals use to steal personal and financial information. Phishing messages are unsolicited messages from cyber criminals who pretend to be someone they are not, like your bank. Cyber criminals have become increasingly sophisticated in their phishing campaigns, which is why it’s so important to learn the signs. This week, we’re discussing different ways you can spot phishing and how to be cautious online.
Social media
Social media platforms are a great way to stay in touch with family and connect with friends. But if you aren’t careful online, social media can also be an easy way for cyber criminals to learn more about you so they can steal your information. There are different ways to stay safe online, like spotting phishing, reviewing privacy settings and keeping your personal information private.
Social engineering
Social engineering is a form of phishing used by cyber criminals to steal sensitive information by manipulating victims. For example, a cyber criminal may contact you by email or over the phone using facts that you have made public (like posting where you work on social media) to make their request seem legitimate. This week, find out how to spot social engineering and how to protect your personal information from being exploited.
Identity theft and protecting your digital identity
Your digital identity is an online record of your personal information. It could include something as simple as your email address or social media account, or more sensitive information like your social insurance number (SIN), passwords and even your financial information. Explore ways to protect your digital identity like knowing how to spot phishing, keeping your information private, securing your accounts and more.
Artificial intelligence (AI) generated content
The rise of artificial intelligence (AI) generated content can make it more difficult to determine whether something you see online is real or fake. Even if you don’t believe what you see, disinformation can create doubt and cause confusion. There are tools that can help fact check disinformation like reverse image searching and tips on how to spot spoofing and other scams.
Conclusion
You can be part of Generation Cyber Safe by learning how to stay safe while connecting with others online! Learn more this week by getting familiar with the signs of phishing and social engineering, safe social media habits and learning how to spot AI-generated content.
USE OF MATERIALS
All materials available on the www.MennoPlaceStaff.com website are published for the sole purpose of keeping informed those individuals who work on the Menno Place campus. These materials may be shared with others who are also connected to the Menno Place campus in this same way. No content or material may be used or shared in any other context without the written permission of the Menno Place Director who oversees communications.