Our Blog

How to minimize risks after a data breach

Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats. Determine what was breached Whether its names, […]

Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security […]

What’s new at the 2018 Apple WWDC?

San Jose, California, recently hosted WWDC 2018. Apple’s engineers interacted with the developers in attendance, while everyone at the event got a sneak preview at the computer manufacturer’s upcoming products and software. Check out the highlights from the event right here! A more personal, faster iOS 12 Apple has focused on improving the operating system’s […]

Canada Set To Be A Global Leader in Cyber Security

We've all heard about the massive cyber breaches that have been reported in the news over the past year, which have made a lot of people nervous, and rightly so.

The Government of Canada has released its long-awaited update to the national cyber security strategy, which is designed to better protect Canadians from cyber crime, quickly respond to emerging threats, and provide protection for critical government and private sector systems.

Hide & Seek: New IoT malware to watch out for

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices. What is the Hide And Seek malware? The Hide and Seek (HNS) […]

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward […]

The dangers of app overload in businesses

Businesses today rely on countless apps and software for day-to-day operations. However, too many of these programs can do more harm than good. App overload brings confusion among employees, and a recent study shows that this costs more than companies realize. How app confusion occurs A new study conducted by CITE Research shows that a […]

Why fewer teenagers choose Facebook

Facebook’s 13-to-17-year-old users are declining despite the overall growth of the social media giant’s subscribers. A new survey by Pew Research Center found that only 51% of US teens are using Facebook, compared with Snapchat (69%), Instagram (72%), and YouTube (85%). Reasons for user demographic shift The same survey found that only 10% of US […]

How to defend against insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate – The workforce (meaning all healthcare […]