Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

Cyber-Weapons: The Krav Maga of cyber security

Unexpected tactically-driven attacks are so effective in the industry today because of the violent nature and overall surprise. Krav Maga is a guerilla hand-to-hand combat fighting style...

MINE OR YOURS: Who owns the information on your mobile device?

Mobile security is becoming a huge concern for the business and enterprise world as the BYOD discussion is an expensive one – either companies enforce a corporate...

Fort Knox or Cardboard Box: Importance of Physical Security

Are you spending millions of dollars annually but still lack the ability to prevent cyber espionage? The answer is more simple than you think – Physical Security. Over-spending...

HACKERS WANT YOU: to fall for phishing emails

One of the easiest methods of infiltrating the most security-driven companies, is the classic phishing email. Phishing emails are designed to take advantage of easily exploitable employees...

MALWARE: A Virus or not a virus

It is often misconstrued by the media that all cyber-attacks are a result of viruses. A virus is a type of malware, not the other way around....

EVEN SUPERHEROES NEED TO WORK TOGETHER: Holistic Solutions

Even the greatest superheroes, like Superman, had to work in conjunction with others to protect the world. The same idea applies to cyber security; no single solution...

EVERY MASTERPIECE HAS A GREAT BEGINNING: Introducing Cyber SITREP!

The Cyber SITREP blog series got its name from combining my love of all things Cyber, and my background serving in the Canadian Armed Forces. The term...

Managing Risk: What’s Your Network’s Threat IQ

In recent months, we’ve seen increasingly sophisticated attacks targeting specific organizations, compromised IoT devices used in DDoS attacks, and large-scale ransomware outbreaks spreading across the globe. Many businesses...

Managing Risk: Top Four Ways to Make Your Computing More Secure and Manageable

According to the Ponemon Institute and 3M, "90% of visual hacking attempts are successful", 48% of IT managers say security is among top concerns, and there is...

Managing Risk: Locky, Then WannaCry, Now Petya. Is This The New Normal in Cyber...

Since Cyber Security is one of the most talked about topics in IT - as I type this, news reports continue to roll in about yet the...

Must Read