Follow Us:

Call Us: (289) 316-0507



Canada’s Data Breach Response Effective November 1, 2018: 5 Key Areas

Every Canadian business must adhere to Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) – any organization that collects, uses or discloses personal information must ensure they’re ready to comply with the privacy act’s new mandatory data breach response requirements as of November 1, 2018 or face non-compliance consequences.

Are You Prepared For A Cyber Attack?

This question I constantly ask prospects which usually get a response of “I believe so” or “We have someone who looks after that”.

As the number of people that have devices connect, the risk and impact of data breaches from malicious cyber attacks, system failures, and human failures will only continue to increase.

Coming To A Workplace Near You: Social-Engineering Attacks

What is trust? As human beings, we have the tendency to trust others, even if we like to think so or not. In the new digital age of social engineering, the attacks are going beyond your typical obvious looking phishing attacks with fake company logos, fake help desk phone calls – however, more sophisticated attacks are emerging that go beyond amateur means.

Managing Cyber Risk In Our Digital World

According to Microsoft Secure Blog The Emerging Era of Cyber Defense and Cybercrime, by the year 2020 the world will need to cyber defend 50 times more data than it does at the present day. The World Economic Form recognized cyber risk as one of the top commercial risks facing the world today.

Ten Questions To Evaluate Your Business Vulnerabilities

When it comes to your organization’s protection against cyber-crime, there are many questions that can be asked to assess your vulnerabilities. Regardless of your company size or field – these vulnerabilities directly affect each and every one of you in ways you may not even realize.

Digital Assistants Pose Security Risks

Voice-activated digital assistants like Echo, Alexa, and Siri – have become commonplace for most households and now businesses. This opens up new types of security risks – from issuing commands that aren’t audible to humans to exploiting accessibility settings.

The Importance of Hardware Security

In the light of the recent Meltdown and Spectre vulnerabilities that are currently found in processors should provide good lessons for all. These hardware-based attacks are known as “side-channel attack”.