Welcome to Our Cyber Security Blog

Articles written by our industry professionals to help keep you and your organization safe from cyber threats.
Don’t let your public online information empower hackers

Don’t let your public online information empower hackers

Our collective online lives have become largely ubiquitous—connecting us with colleagues, friends, and family, and others around the world. However, in doing so, many of our practices are still based on the pre-online times when “the world” didn’t have access to the...

read more
What does grammar have to do with Cyber Security?

What does grammar have to do with Cyber Security?

Over the years, anyone with an email account has inevitably received emails that can only be described as "questionable" at best—the grammar, style, and even formatting can at times be borderline laughable. For instance, to this day the famed and still poorly written...

read more
This is not just any article about Quid Pro Quo

This is not just any article about Quid Pro Quo

So, before you think I'm about to embark down some dark path of political rants, I can assure you I have no interest nor desire to do so. Instead, as 2019 comes to an end, I thought it best to embark instead down a path of education as it pertains to a very real, and...

read more
What is that? And why is it breaching your network?

What is that? And why is it breaching your network?

It's no surprise that mobile devices are everywhere: just this morning I counted 20 in plain sight within 10 feet of my office. And that was just mobile phones. That didn't include laptops, tablets, hard drives, thumb drives... you get the picture. But it doesn't end...

read more
Prioritizing Security Risks—Not Vulnerabilities

Prioritizing Security Risks—Not Vulnerabilities

With an attack surface that’s borderless, complicated, and connected to everyone and everything, it’s difficult, verging on the impossible, to fully protect the business from data breaches and their far-reaching consequences. Furthermore, if the company is relying on...

read more
Your Cyber Security products don’t do anything

Your Cyber Security products don’t do anything

In today's commodity-driven world, our collective society is constantly told what to buy: quick purchases that can solve all our problems with a single product. It's literally what the advertising industry is built on. Whether it's a quick-fix, money-making scheme, a...

read more
Your company’s enemy within

Your company’s enemy within

The topic of cyber security is never an easy subject. The breadth of solutions needed in this day and age to thwart attackers is at an all-time high, while breaches seem to be climbing exponentially driving the need for solutions.However, through media and marketing,...

read more
Are you, by chance, accessing your corporate data from Russia?

Are you, by chance, accessing your corporate data from Russia?

Accepting the idea that modern technology makes our lives easier is always a struggle. Yes, it gives us the ability to work where, when and how we want—allowing access from virtually anywhere in the world. However, with the modern freedoms that technology affords us...

read more
I have your password, now give me money.

I have your password, now give me money.

From ransomeware, to viruses, to our favourite Nigerian Prince still looking for that business associate, the number of scams that pop up through people's email is seemingly endless. So, of course, when scams start to become trendy, it's always a good thing to shine a...

read more
Cloud and Compliance. The struggle is real.

Cloud and Compliance. The struggle is real.

To say that we live in a world with unprecedented access to technology would be a profound understatement. And, as everything from computers to mobile devices and more can seamlessly connect to the cloud and to corporate infrastructure, the freedom that people have to...

read more

Corporate Headquarters

770 Palladium Drive
Ottawa, ON, K2V 1C8

1-877-225-4264

Have a cyber security question? We are here to help!

4 + 9 =