May 24, 2016

Top Four Reasons for Data Loss

To some extent, data loss is unavoidable. Many people are aware that losing data can happen, but don’t understand that it can happen any time. It […]
May 16, 2016

Signs You Need to Modernize Your Backup and Recovery Solution

The data protection market has changed significantly over the past decade. There has been a fundamental shift away from taping a backup and recovery solution to […]
May 9, 2016

Whaling and What You Need to Know About It

Due to an increasing concern on a new method of cyber fraud and scamming, aptly referred to as ‘whaling’, we decided to write a post on whaling […]
April 1, 2016

Ransomware: The Rules of Engagement

Ransomware is a malicious software that seeks out files on your computer and locks them, rendering them inaccessible, then cybercriminals demand money — a ransom — to unlock your […]
April 1, 2016

What You Need to Know About Phishing

Phishing messages with links in an email, text message or on a website are designed to steal money from unsuspecting recipients. Cybercriminals can do this by […]
March 31, 2016

Four IT Policies You Need Today

IT policies are a set of documents that state how a company plans to operate, control and protect its IT assets. These policies don’t need to run […]
March 24, 2016

Economic crime is up in the Canadian marketplace

According to the newly-released Global Economic Crime Survey 2016, 37% of Canadian companies were hit by economic crime in the past 24 months and 28% of the fraud […]
March 8, 2016

PIPEDA Overview

The Personal Information Protection and Electronic Documents Act (PIPEDA or the PIPED Act) is a Canadian law relating to data privacy. It governs how private sector […]
February 25, 2016

Intro to IT Compliance

IT Compliance is the state of meeting system security requirements which have been mandated either by your industry, by law or simply by your organization as […]
February 16, 2016

2016: The Year of Cloud Computing

While 2015 might be recognized the year when cloud services became the main platform for enterprise applications and data storage, there are a lot of technologies […]