IT Security

May 9, 2016

Whaling and What You Need to Know About It

Due to an increasing concern on a new method of cyber fraud and scamming, aptly referred to as ‘whaling’, we decided to write a post on whaling […]
April 1, 2016

Ransomware: The Rules of Engagement

Ransomware is a malicious software that seeks out files on your computer and locks them, rendering them inaccessible, then cybercriminals demand money — a ransom — to unlock your […]
March 31, 2016

Four IT Policies You Need Today

IT policies are a set of documents that state how a company plans to operate, control and protect its IT assets. These policies don’t need to run […]
March 24, 2016

Economic crime is up in the Canadian marketplace

According to the newly-released Global Economic Crime Survey 2016, 37% of Canadian companies were hit by economic crime in the past 24 months and 28% of the fraud […]
March 8, 2016

PIPEDA Overview

The Personal Information Protection and Electronic Documents Act (PIPEDA or the PIPED Act) is a Canadian law relating to data privacy. It governs how private sector […]
February 25, 2016

Intro to IT Compliance

IT Compliance is the state of meeting system security requirements which have been mandated either by your industry, by law or simply by your organization as […]
February 8, 2016

Worst Passwords of 2015

Is your password on this list? Let’s hope not!  Data security is a hot topic for any industry and any size business. Passwords are the gateway […]
February 4, 2016

Google Study: Comparing Expert and Non-Expert Security Practices

Google researchers conducted two surveys recently; one with 231 security experts and another with 294 web-users who aren’t security experts. They asked both groups what they do […]
February 3, 2016

Top 5 IT Security Threats for 2016

According to Bev Robb, IT Consultant and Blogger for the Dell Insight Partners program, 2016 will be full of “the cyber threats that we have seen prevail” […]