Monday, October 21, 2024

Cybersecurity Awareness Week 4: Putting It All Together

 October is Cyber Security Awareness Month (CSAM). The goal of CSAM is to help Canadians stay cyber-safe by equipping them with knowledge through the following four themes:

  • Week 1:  You Got Phished
  • Week 2:  Where, Why and How It Happens
  • Week 3:  Prevention
  • Week 4: Putting It All Together

For the final week of CSAM we're focusing on the theme, “Putting It All Together”. This week, we're discussing how to spot the 7 red flags of phishing, cybersecurity tips for older adults and children, and how to equip colleagues with knowledge of phishing.

The 7 Red Flags of Phishing

Phishing is a common method that hackers will use to steal valuable information from individuals and organizations. Phishing scams are often disguised as messages from people and organizations that you trust, making them easier to fall victim to.

The most important way to avoid a phishing scam is to learn how to recognize one. Here are seven red flags to look out for:

  1. Urgent or threatening language: Look out for threats of closing your account or taking legal action, and pressure to respond or act on something quickly.
  2. Requests for sensitive information: Be on alert for links directing you to login pages, requests to update your credentials, and demands for your or your company’s financial information.
  3. Anything too good to be true: Avoid actions on messages that claim winnings from contests you’ve never entered, prizes you must pay to receive, and inheritance from long-lost relatives.
  4. Unexpected emails: Disregard emails such as receipts for items you’ve never purchased and updates on deliveries for things you didn’t order.
  5. Information mismatches: Look out for incorrect (but maybe similar) sender email addresses, links that don’t go to official websites, and errors in spelling or grammar that a legitimate organization wouldn’t miss.
  6. Suspicious attachments: Avoid attachments that you didn’t ask for that have weird file names or uncommon file types.
  7. Unprofessional design: Be on alert for incorrect or blurry company logos, image-only emails, and company emails with little, poor, or no formatting.

If you encounter any of these red flags in an email or message, do not interact with it. Rather, delete the email or message. If you are unsure, ask the sender about the message through a different channel.

Cybersecurity Tips for Older Adults and Children

https://www.youtube.com/watch?v=WQ9ZNShXbC0

Learning how to be cyber safe can seem like an overwhelming task. For older adults and children, there is a lot to learn about practicing safe online behaviour, as well as ensuring your devices are protected from cyber threats. The best way to prevent falling victim to a cyber-attack, such as phishing, is to know how to recognize and prevent yourself from becoming a victim.

Our devices do a great job of making our lives more convenient! For example, older adults can turn to their computers and tablets to chat with their family and friends, and kids can turn to their smart speaker and ask for homework help (“Hey Google, what is 2 x 2?”), learn about any topic of their choosing, play music, and more! But, just like other internet-connected devices, smart devices can give potential cybercriminals access to our information.

If you encounter any of the seven red flags of phishing in an email, phone call, or text message (aka smishing), do not interact with it. Delete the email or text, do not answer the call (or hang up), and if relevant report it.  Phishing attempts are becoming more sophisticated, so if you are unsure ask the “sender” about the message through a different channel.

For example, if your child receives an email from their teacher asking them to send them personal information- it is likely a phishing attempt as teachers, or the school would reach out to the parent. In this case, you or your child can ask their teacher directly in their next online or in-person class to confirm if the request was legitimate or not.

Older adults must also be on the lookout for the red flags of phishing as they can become a target of cybercrime such as romance scams, tech support scams and grandchild scams.  Some actionable steps that both older adults and parents of young children can take to practice cyber safety include:

  • Teach children about cyber safety
  • Think twice before you share any personal information online
  • Always verify requests with a trusted source
  • Use anti-virus and malware protection
  • Backup your data
  • Only visit trusted websites and do not click on unknown links or attachments
  • Protect your accounts with MFA
  • Use complex passphrases and passwords

How To Equip Colleagues with Knowledge Of Phishing

Whether you’re working at the office or remotely, cyber security practices should be taken seriously. Businesses of every size can be a target of cyber crimes such as ransomware, phishing, and malware. While not completely unavoidable, proactive measures should be taken to avoid cybercrime and protect your business networks.

Cyber security is a team effort that requires action from both management and employees. The best way to equip your team to prevent becoming a victim of cybercrime is to learn how to recognize and prevent it! Here is what you can do to ensure your team is prepared to avoid common cyber crimes, such as phishing:

  • Implement Email Best Practices: Combat the inevitability of cybersecurity breach attempts through email by communicating best practices with your employees. Practices such as: separating internal and external emails, prohibition of all unknown email link clicks and keeping an updated SPAM filter.
  • Educate Your Team: Ensure that your team understands what is at stake with a business’s cybersecurity. Highlight case studies to show your team how poor cyber habits cost other businesses and share examples of what an attempted cyberattack looks like. Learn the seven red flags of phishing, and always be on alert.
  • Implement Information Regulations: Create strict rules on when it is appropriate for an employee to give out personal, sensitive or business-related information through any form of electronic communication or online medium.
  • Implement Browser Best Practices: Combat the inevitability of cybersecurity breach attempts through online websites by communicating browser best practices with your employees. Practices such as firewall implementation, browser monitoring/usage limitations and education on online safety features (such as SSL).
  • Implement Personal Account Regulations: Create regulations surrounding what personal accounts employees can and cannot access on the business network (such as personal banking and email accounts).

Your colleagues are your first line of defense against common cyber attacks, including phishing and ransomware. Did you know that AlphaKOR offers Cyber and Phishing User Training services? These services include dedicated training and educational materials to educate your employees about cybersecurity risks. 

Your Cyber Security Partner

As Cyber Security Awareness Month comes to an end, be sure to extend what you have learned this past month into your everyday cyber habits! 


Tuesday, October 15, 2024

Cybersecurity Awareness Week 3: Prevention

 October is Cyber Security Awareness Month (CSAM). The goal of CSAM is to help Canadians stay cyber-safe by equipping them with knowledge through the following four themes:

  • Week 1:  You Got Phished
  • Week 2:  Where, Why and How It Happens
  • Week 3:  Prevention
  • Week 4:  Putting It All Together

This week’s theme, “Prevention” focuses on 5 actionable steps to prevent becoming a victim of cybercrime.

Tip #1: Use Strong and Unique Passphrases and Passwords

Did you know that at least 65%  use the same password across multiple sites? Although this makes remembering your credentials easier to do, this also makes your accounts vulnerable to cyberattacks.

By creating complex passphrases and unique passwords for each site you use, you instantly tighten up your security, making your accounts less attractive to hackers. Some best practices for creating complex passphrases include:

  • Avoiding family, pet, company, and familiar names that can be easily guessed by others
  • Using unique combinations of letters, numbers, symbols, and cases for each site you use
  • Creating passwords with at least 4 words and 15 characters long

Tip #2: Use A Password Manager

Our passwords protect the things that are important to us, such as our financial information, our social media accounts, and more. But with all the platforms and websites we actively use, it can be difficult to keep track of unique and complex passwords for each platform.

Password managers such as Google Password Manager help you create complex passphrases and store them so that you never forget a password again.

Tip #3: Enable Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is an added layer of security that is catered to you so that only you can access your accounts and private information. This dual layer of security is simple to implement and consists of two or more independent credentials to verify you are who you claim to be. Three of the most common credentials consist of what the user knows (password), what the user has (security token) and what the user is (biometric verification).

Some common forms of MFA include:

  • Fingerprint scanners
  • Voice verification
  • Facial recognition
  • Security questions
  • PIN numbers
  • SMS authentication
  • App-based authenticators
  • Hardware tokens

Implementing MFA is an excellent way to add an extra security layer to your system. Did you know that by adding something as simple as MFA to your accounts, you can protect yourself from automated bots, phishing attacks and targeted attacks?

In short, MFA works to prevent malicious activity on your network, keeping your sensitive data safe and secure. We suggest you allow MFA everywhere it can be used and if you don’t have the capabilities perhaps it’s time to invest in a little extra digital security.

Tip #4: Regularly Backing Up Your Important Data

Your important data is important! Be sure to keep it safe on your devices so that it does not get lost, corrupted, or fall into the wrong hands. One of the best ways to keep your data safe is to regularly back up your important data.

There are many benefits to taking the time to back up your data, including:

  • Ensuring you always have a backup in case of a disaster such as a cyberattack or breaking your device
  • Freeing up storage space on your device
  • Protecting your special moments from accidental corruption

Backing up files is easy to do! You can back up your data physically and/or digitally. To back up your files physically, you’ll need an external device such as a USB stick or an external hard drive. Once your files are backed up physically, you’ll want to ensure that you keep your external device stored in a safe location.

To back up your data digitally, you can use a reputable online cloud server. There are many great options to choose from! Some online cloud servers offer free storage up until a certain amount, while others have subscription fees.

Whether you decide to back up physically or digitally, choose what works best for you.

Tip #5: Protecting Your Small Business Against Phishing Attacks

No business is too small to become a victim of a phishing attack. More than half of email scams and phishing attempts target small businesses.

Phishing is a common method that hackers will use to steal valuable information from both individuals and organizations. Phishing scams are often disguised as messages from people and organizations that you trust, making them easier to fall victim to.

It’s important for small businesses to take steps to protect their private and important information. The following are simple tips for small businesses to follow:

  • Only visit legitimate and trusted websites while working from a business computer or device used for business operations
  • Verify that you are only providing personal and business information to trusted sources
  • Always question why your personal information is required when asked for it
  • Do not remove or disable any security safeguards on your business network and devices such as anti-virus software

Always


Stay Cyber Safe

Whether it’s Cyber Security Awareness Month or any other day, always keep cybersecurity practices in mind to keep your cyber safe. 


Monday, October 7, 2024

Cybersecurity Awareness Week 2: Phishing - Where, Why and How It Happens

October is Cyber Security Awareness Month (CSAM). The goal of CSAM is to help Canadians stay cyber-safe by equipping them with knowledge through the following four themes

  • Week 1:  You Got Phished
  • Week 2: Where, Why and How It Happens
  • Week 3: Prevention
  • Week 4: Putting It All Together

This week’s theme, “Where, Why and How It Happens”, focuses on what phishing is, where it happens, the motivation behind cyber threats and how it works.

What is Phishing?

Phishing is a common method that hackers will use to steal valuable information from individuals and organizations. Phishing scams are often disguised as messages from people and organizations that you trust, making them easier to fall victim to.

What are the different types of phishing?

Phishing can take on many different forms, as well as come from a variety of mediums including email, phone, online shopping, gaming, social media, and direct messages. The following is a quick overview of the most common types of phishing campaigns that cybercriminals use to steal your information.

Smishing

Smishing is a phishing attempt that occurs through text message (SMS) and involves a cybercriminal impersonating someone to steal information from you. In many cases, smishing messages contain a link they are trying to get you to click on.

To protect yourself against smishing attacks, always be cautious about the messages you receive from people you do not recognize. If you are unsure, try to verify the information and confirm if the identity they are taking on is legitimate. For example, if you receive a message claiming to be your school, call your school using the contact information available on their official website and verify whether the request is real or smishing.

Spear Phishing

Spear phishing is a message that is tailored to the target's potential line of work, interests, and/or personal characteristics. To do this, cybercriminals conduct research about their victims and use their findings to make their messages seem authentic. They then send these spear phishing attempts disguised as a credible source, with the subject being something relevant to their victims in hopes to increase the success rate of their attempts. When successful, victims hand over their personal information, such as a credit card number, to the cybercriminal.

Whaling

Whaling attacks are sophisticated messages that target high-profile victims who have the authority to issue large payments. Whaling attempts are designed to trick these victims into thinking they must make a payment to another organization, but in reality, the payment is directed to the pockets of the cybercriminal.

Phishing Trends

Now that you know the various types of phishing, it’s important to be aware of phishing trends so that you can spot any potential attempts.

Banking Scams

Cybercriminals will pose as your financial institution and send urgent, or too good to be true messages in hopes of their victims taking action. If you receive a phone call, email, or message that asks you to claim the money in exchange for verifying your credit card number or asking you to pay for outstanding banking fees, be wary and do not give over your information. Always verify with your banking institution by visiting in person, or calling the phone number listed on their official website to verify if the request is legitimate.

Romance Scams

There is plenty of phish in the sea! Looking for companionship online has been made easy with the help of dating websites and apps, but sometimes profiles are too good to be true. Romance scams happen often when a cybercriminal creates a fake profile with the goal of taking advantage of someone looking for romance.

To avoid becoming a victim of a romance scam, always be cautious about what information you share on dating websites and apps. Never give your personal information such as your SIN number, banking information, or even the answers to security questions such as your mother’s maiden name.

Event-Based Scams

Event-based scams happen when cyber criminals take advantage of events, such as a concert or sports games, to steal information and money from their victims. When it comes to phishing, cyber criminals will typically send out messages posing as event organizers and include a link. When the link is clicked, you are likely to be prompted to enter sensitive data such as a credit card number or credentials to your financial institution.

Spoofing is a tactic that is often used with event-based scams, which is when a cybercriminal will create a fake look-alike website or app to trick users into making fake purchases. Be sure to guard your personal information and always verify that the websites you are using to purchase event tickets are legitimate.

Malware and Ransomware

Malware is one of the most common ways people experience a cyber attack. Malware is software  specifically designed to interfere with, damage, or gain unauthorized access to a computer system. If your device is infected, it can cause freezing and crashing, poor performance, unwanted pop-ups, and toolbars, and even send out unwanted emails.

Malware presents itself in many forms, including viruses, worms, trojan horses, spyware and adware, and ransomware.

With a ransomware attack, access to your computer or electronic device is blocked until a ransom is paid to the cybercriminal. These common forms of malware are sometimes difficult to recognize. The following best practices can help you protect your computer system against malware:

  • Install and use anti-virus software
  • Avoid suspicious links and email attachments
  • Download only from trusted sources
  • Use a VPN on unsecured networks like public Wi-Fi

Beware of Social Engineering

A social engineering attack is a web user is tricked into doing something dangerous online. There are various types of social engineering attacks, with a prominent form of it being phishing.  Always think twice before you share your information online and take actionable steps to protect your devices against phishing, malware, and ransomware.

Stay Cyber Safe

Whether it’s Cyber Security Awareness Month or any other day, always keep cybersecurity practices in mind to keep your cyber safe. 



Friday, October 4, 2024

October is Cyber Security Awareness Month

 October is Cyber Security Awareness Month (CSAM). The goal of CSAM is to help Canadians stay cyber safe by equipping them with knowledge through the following four themes:  

  • Week 1:  You Got Phished
  • Week 2: Where, Why and How It Happens
  • Week 3: Prevention
  • Week 4: Putting It All Together

This week’s theme, “You Got Phished”, focuses on actionable steps to take to recover from a phishing attack.

Before we get started, it’s important to understand what Phishing is. Phishing is a common method that hackers will use to steal valuable information from individuals and organizations. Phishing scams are often disguised as messages from people and organizations that you trust, making them easier to fall victim to.

How to tell if you have been phished or hacked

The most evident sign that you have been phished or hacked is when you notice changes to your accounts. This might look like not being able to access your email accounts, noticing suspicious charges to your bank or credit card accounts, or even receiving notifications on social media from friends alerting you that your accounts have been compromised.

Before you notice these clear signs of unusual behaviour, there may also be notifications from your accounts alerting you of changes. For example, if a malicious actor is attempting to sign into your email account, you may receive notifications asking you to confirm that “you” are trying to sign in from a certain location. In some cases, these alerts may also come after a successful sign-in attempt from a malicious actor. Banks may also block purchases from being made on your card until you confirm whether the transaction is coming from you.

To help keep you safe from phishing, we’re sharing 4 easy tips, as well as what to do if you have been phished.

Tip #1: Change passwords and upgrade passwords to passphrases

Did you know that at least 65% of people reuse the same passwords across multiple sites? Although this makes remembering your credentials easier to do, this also makes your accounts vulnerable to cyberattacks.

By creating complex passphrases and unique passwords for each site you use, you instantly tighten up your security, making your accounts less attractive to hackers. Password managers such as Google Password Manager and LastPass can easily help you create complex passphrases and store them so that you never forget a password again.

Some best practices for creating complex passphrases include:

  • Avoiding family, pet, company, and familiar names that can be easily guessed by others
  • Using unique combinations of letters, numbers, symbols, and cases for each site you use
  • Creating passwords with at least 4 words and 15 characters long

Tip #2: Enable anti-Malware and anti-virus software

Malware is one of the most common ways people experience a cyberattack. Did you know the majority of Canadians have had malware on their computer?  Malware is software specifically designed to interfere with, damage, or gain unauthorized access to a computer system. If your device is infected, it can cause freezing and crashing, poor performance, unwanted pop-ups, and toolbars, and even send out unwanted emails.

Malware presents itself in many forms, including viruses, worms, trojan horses, spyware and adware, and ransomware. These common forms of malware are sometimes difficult to recognize. The following best practices can help you protect your computer system against malware:

  • Install and use anti-virus software
  • Avoid suspicious links and email attachments
  • Download only from trusted sources
  • Use a VPN on unsecured networks like public Wi-Fi

Tip #3: Enable automatic software updates

Updating your programs and operating systems regularly ensures that you are benefiting from the latest security patches and bug fixes, making it harder for cybercriminals to exploit your data with malware. Keep your systems, programs, and applications updated. Most programs and operating systems do a great job at reminding their users when an update is available. Enabling automatic updates on your devices will help ensure that you don’t miss an update!

Tip #4: Back up your data

Backing up files is easy to do! You can back up your data physically and/or digitally. To back up your files physically, you’ll need an external device such as a USB stick or an external hard drive. Once your files are backed up physically, you’ll want to ensure that you keep your external device stored in a safe location.

To back up your data digitally, you can use a reputable online cloud server. There are many great options to choose from! Some online cloud servers offer free storage up to a certain amount, while others have subscription fees.

Whether you decide to back up physically or digitally, choose what works best for you.

Keep Others Safe and Report The Scam

If you have been targeted by a phishing scam in Canada, you can help keep others safe by reporting the scam. You can report the scam by contacting:

  • Your local police: file a report about the phishing scam or fraud. Remember to get a report number for your reference.
  • Regulatory bodies: if the scam involves someone from a regulated profession, regulatory bodies may have the ability to take disciplinary action to prevent further incidents.

Stay Cyber Safe

Whether it’s Cyber Security Awareness Month or any other day, always keep cybersecurity practices in mind to keep your cyber safe. 

Wednesday, April 24, 2024

Celebrating 36 Years Of A Tremendous Journey!

 

Celebrating 36 years in the IT industry and what a tremendous journey so far!

We need to stop and celebrate the moments by sharing our positive news with each other.  This week marks 36  years since my professional career started right after graduating from the University of Windsor with a Bachelor of Commerce degree!  

Join me in smothering the Internet with positive news, accomplishments and milestones.  Share your celebrations with the world as we enjoy each others’ successes. 

Extremely grateful for everyone along this journey.  Humbled to be called “The Connector” and expert on the subject matter for cybersecurity and entrepreneurship.  The recognition, awards, accolades, podcast appearances, guest presenter, media appearances on so many different platforms to help others enriches me to continue to grow.  I see how important it is for all of us to truly care and help one another.

Thanks To My Beautiful Family

I would like to thank so many terrific people who have supported and helped me along this awesome journey!  Thanks to the lovely Carmela for her love, support and always being here for me.  To Haley & Brandon and Syd & Michael for their love and for keeping things in perspective on what's important along the way.  To my mom, dad, who was so proud of me and miss him dearly, my in-laws, all the extended family and friends for all your love and support, thank you.

Some Highlights And Milestones

Here are some highlights to share with you of a wonderful journey.

My first day was April 25th, 1988 at Computerway, a subsidiary of Epson Canada.  The manager provided a quick overview of the two main computers; the 286 or AT and the 8088 or XT..... and that's how it all started by learning specifications, talking to first-time buyers and answering their questions.  Not many options to choose from except monochrome screens available with green, white and the latest with amber text.

Around 1994 the Internet was starting to catch on and e-mail was being used first internally and then to the world.  The wealth of information on the 'Net was incredible for all of us "early adopters" and it was always interesting to see what most people were looking for.  (Hint: it was non-business related).

Joined CCD for 5 years from 1991 to 1996 as corporate sales.   It was exciting to see a small company grow over the years.   Spent most of the time "pounding the pavement", getting a lot of no's and doors slammed.   The consistency and perseverance paid off in the long run.  Incidentally, in October 2014 we purchased CCD and it sure brought back memories of that period.

Retirement - what was I thinking?

The Retirement - lasted for 6 weeks in early 1996.  For some reason, it felt right at that time for a career change.  I laugh back when I think about this.  It truly was a defining moment to shape my future.  I was so glad when Shawn called asking me to consider joining AlphaKOR.  It was a very easy decision to make since Ali, Mazen and Shawn provide the best service second to none.  I was asked to sell the "sizzle" and they always delivered the "steak".

We were well ahead of the curve in our discussions about websites in 1996 and Y2K in 1997.  Most businesses were not ready for either conversation.  The early website discussion was about having your company domain name and adding an e-mail address under your fax number.  (For the younger readers you can Google "fax machines").

Moving in the fall of 2008 on the eve of very tough economic times was a bit scary.  As most companies scaled back, they leaned heavier on us for support.  Our team more than doubled in the six years while at our Mercer location and we had to take on a second location as we were busting at the seams.

In the Fall of 2014, we challenged ourselves with purchasing our current location at Twin Oaks, buying CCD and undertaking major renovations to fit our needs.  One of my favourite days was June 18, 2015, for our Open House with Mayor Dilkens, Chamber President Matt Marchand and WEtech President Yvonne Pilon who took part in the Opening Ceremonies before we cut the "ribbon" to open our 12 000 sq. ft. two-acre location!

As we have evolved from humble beginnings in a 600 sq. ft. retail space to where we are today, we truly have to thank The AlphaKORians, for all they do.  Your gift of the tree:   "4 Partners planted in the community" is very special as it continues to grow at Dieppe Gardens.  My Partners, Ali, Mazen and Shawn working together, pursuing our dreams and aspirations are the amazing guys behind the scenes.   Thanks, guys for believing in me so I can do what I love best and tell our story!  Thanks to Charlene, Maha and Lori for all your support and for being here for us.

4 Partners Planted In The Community

In 2014, AlphaKOR was named Tech Company of the Year at the WEtech Tech Awards.  We keep growing and keep leading in Technology with Cybersecurity being a hot topic everyone needs to deal with and have a strategic plan in place.  It is exciting every day to be part of an awesome Team and to help so many both for their business and to give back to the community.

And Now We are 5 Partners 

Today we are 5 Partners and recently announced Liqaa as our CEO.  AlphaKOR celebrated 29 years of successful growth earlier this year!

I enjoy every day as the President and love sharing our story.  Connecting with familiar and new like-minded people is rewarding as we learn from each other.  Presenting to audiences virtually or in person are the highlights of this role. 

Supporting Our Community

I truly enjoy being involved in a number of organizations and have found it very enriching. Being part of Build A Dream, St. Clair College, The Giving Eight, University of Windsor, WEST, WEtech, WECYAC, WindsorEssex Chamber to name a few.  Being a mentor is one of my favourite roles working with entrepreneurs pursuing their passion.  

Building our own networking groups, the WindsorEssex Circle with my co-host Joe Di Giorgio which ram from 2009 until 2020.  My current pet project is the networking group called Wednesday Wisdom.  This group began January 2021 as a weekly virtual group and evolved into a monthly in-person group.  Thanks to everyone who shared and helped with the challenges of the "new norm".

Throughout the years with my volunteer hat, I have met so many wonderful and inspiring leaders, entrepreneurs and many caring people.   You have enriched my life, taught me how we can make a difference by caring and giving back.

Humbled & Grateful

It is an honour and humbling when the media and the community recognize our commitment and dedication to service.  It is overwhelming when a news story hits and the media calls to interview you as the expert on the subject matter.

I recall going to CBC studios for a news segment on Security Breaches the day the CRA story hit.  My Dad called me and told me what a great story it was to hear me talk about the issue. I asked if he understood the interview and he replied "No, but boy you and the reporter talked a lot and did a good job".   Thanks, Dad, my first mentor who taught us how to take care of people at our roadside fruit stand.   Who knew my sales career actually started in 1971!

We have been blessed with many accolades and awards.   We always remember where we came from, how we arrived here and everyone who helped along the way, thank you.

Fun Moments

Three of my favourites are Entrepreneur of the Year, Chamber BEA 2012, Tech Mentor of the Year, WEtech 2017 and Mid-Size Company of the Year, Chamber BEA 2014.  By the way, I dedicated the Tech Mentor award to the AlphaKORians' who have inspired me to share their stories and all the great stuff they do.

Volunteering and giving back to the community by sitting on Boards, and being a mentor helping others has been self-rewarding.   Never be afraid to get out of your comfort zone!

The AlphaKORians' Rock!

Special thanks to the AlphaKORians, our loyal clients, associates, friends and families, for being a part of our success.  I am truly blessed for leading such an awesome team.  The AlphaKORians' do rock and have been here taking care of everything all the time. 

Enjoying every day sharing our story as your President for 29 years and counting.  Cheers to many more!

THANK-YOU!

Tuesday, March 12, 2024

Enjoying The Holidays

As the year winds down, it’s time to thank everyone for being a part of my journey with a year of overcoming new challenges, helping others, and continued growth personally and professionally.      

IT JUST KEEPS GETTING BETTER

Every year just keeps on getting better.  In reflecting on all the good things and the challenges we had, it is exciting to see how we continue to grow and move forward in a positive and successful direction.  There are many great people to thank, including my business partners; Ali, Liqaa, Mazen, and Shawn, our spouses, who are always there for us, the incredible AlphaKORians’ and our clients (the extended team).

Thanks to our families, friends, and associates who play a role in our successes.  I thank each and every one of you, thank you!

BALANCING WORK AND THE HOLIDAYS

How do you balance work and the holidays?

This year, the month of December is filled with holiday company events, customer appreciation events, holiday networking events, friends and family holiday events, and many other gatherings.  How many events can you attend and how many do you want to attend?

We had our company holiday dinner after three years and it was enjoyed by all who attended.  It is wonderful to continue this annual tradition of enjoying the AlphaKORians and significant others in a social setting having dinner and good conversations.

Finding the right balance between work and holiday commitments can be challenging.  When clients and suppliers invite you to their appreciation events, it is important to make the effort to attend.  Don’t forget to wish them a Merry Christmas and Happy Holidays!

UNPLUGGING WITH THE FAMILY

Looking forward to this Holiday Season with some time off to enjoy unplugging for a bit while making time for the family.  We seem to forget this as we get swept away by all the activities and invitations.  Our annual tradition is to celebrate Christmas Eve with my family.  My sister is hosting this year.  Everyone brings a dish, so no one has to prepare it all.   

Christmas Day is spent with Carmela’s side of the family.   Another big meal and too many sweets and desserts and of course espresso.  It is always a wonderful time and we enjoy playing cards after the big meal in between naps.  

Happy balancing during the Holiday Season!

SEE YOU NEXT YEAR!

To everyone who supported Wednesday Wisdom virtually and in person, we will continue this monthly event to connect and network with others next year.  Thank you for following the Building Circles blog and appreciated all your comments, feedback and support over the years.

Looking forward to seeing many of you soon and in the New Year!  Thank you, everyone, have a great holiday, and all the best in the new year.  Merry Christmas and enjoy the moment.  Be responsible and take care of your loved ones to ensure everyone gets home safely. Enjoy your holidays and all the best in 2023!

(Originally published on 12.14.22)

The Importance Of Contributing To Your Community

As the year winds down and we head into the holidays, I like to reflect on the things that made the year special. From our partners to our clients and community partners, the AlphaKORians' take pride in contributing to our local community.

In this post, I will be discussing the importance of contributing to community by establishing meaningful connections, as well as sharing how AlphaKOR is involved in the Windsor-Essex community.

Establishing Meaningful Connections

From our humble beginnings, AlphaKOR was founded in Windsor, ON, and grew to be the company it is today. For over 27 years, AlphaKOR has proudly been providing business technology solutions to businesses in the Windsor-Essex area and beyond.

Building meaningful connections in the community with Academia and many Non-Profit organizations, AlphaKOR supports and gives back to be a Community Partner.  Volunteering, sitting on boards/committees, and supporting and participating in community events are some of the ways we have made these connections.

This year, Wednesday Wisdom met monthly to foster new connections, reconnect with established ones, and created a network community to help each other, both professionally and personally.

Giving Back to the Windsor-Essex Community

AlphaKOR is built upon four core values that perfectly define everything we stand for: integrity, excellence, teamwork, and client focus. These values have grown to define the AlphaKORian culture, whether in-house, in the community, or on-site, this is what to expect from each other.

Beyond the call of duty, our incredible team bands together to support local causes, our community, and our education system. Each year, the AlphaKORians’ give back to the community through several causes and fundraising events.   It is important for those who can give back, especially at this time of year.

Over the years, AlphaKOR has proudly given back to the Windsor-Essex community by donating to various causes and participating in a variety of charitable events. During the holiday seasons, we have supported The Hospice of Windsor and Essex County with the help of our long-term client, John Martel. Additionally, we have supported The Windsor Youth Centre, a program of The United Church Downtown Mission of Windsor Inc., with a holiday food and care drive organized by The AlphaKORians, in addition to other local charitable causes.

Keep Giving Back

This year, AlphaKOR will be supporting The Windsor Youth Centre with an in-house HUGS drive.  The AlphaKORians are encouraged to give back to the WindsorEssex youth by donating clothing, hygiene products, winter gear, gift cards, snacks, and more essential items. We also invite any drop-in clients of ours to contribute to the HUGS drive as 100% of contributions will be donated.

There are other ways to contribute to the Community and I would like to circle back to Wednesday Wisdom.  In the Fall of 2020, many were asking how and where networking could take place during the pandemic.  January 2021 Wednesday Wisdom began as a weekly virtual networking group to bring professionals in the Community together.  This evolved into a monthly in-person networking group and peaked at 85 attendees last month!  This has helped many in our Community connect with others, create jobs, and create business opportunities, and the best part it has created relationships and friendships during this challenging time.

Fostering Growth in Windsor-Essex

As a technology leader in the Windsor-Essex community, it is important for us to contribute and give back to our community.  We like to lead by example for others to follow and give back when and where they can.  This year has been special as we continue to move forward together with a hybrid business model and more venues opening up to in-person interactions while continuing virtual interactions to help continue growing our Community.  We are excited about the new investments and opportunities as we wind down this year and welcome these in 2023.

What are you doing as a leader to contribute to Windsor-Essex Community?

(Originally published on 11.30.22)

Contributors