Welcome to Our Cyber Security Blog

Articles written by our industry professionals to help keep you and your organization safe from cyber threats.
Cyber Security in the age of “No Perimeter”

Cyber Security in the age of “No Perimeter”

As digital transformation continues to reshape the business landscape, cyber security becomes an even greater challenge. After all, gone are the days when people simply sat within four walls of an organization, accessed files from a desktop computer, and when done for...

read more
Beware the horrors that dwell in the Microsoft 365 migration

Beware the horrors that dwell in the Microsoft 365 migration

For decades, Microsoft has been and continues to be an integral part of modern business infrastructure. Therefore, it's also not surprising that many businesses are looking to the Microsoft 365 cloud platform as the next logical extension in its long, deeply rooted...

read more
How secure are your online meetings?

How secure are your online meetings?

The transition to home offices for the majority of the world over the past few weeks has been swift, with the majority of companies rising to the occasion and making it all happen without too many bumps in the road. And now as people settle into their new work...

read more
Are IT departments pushing people into the shadows?

Are IT departments pushing people into the shadows?

If you've ever wondered what the single most effective trigger is to make the blood pressure of IT and compliance professionals simultaneously skyrocket, the answer is simple: mention the term Shadow IT and see what happens. And to be completely honest, as a cyber...

read more
What if I told you to embrace rogue IT?

What if I told you to embrace rogue IT?

Ah, the cloud—the never-ending topic of choice for those organizations continually contemplating the dreams and nightmares that it offers. But why is that? You would think by now, the roaring 20s, that the cloud would be something that is just a part of life. After...

read more
This is not about your grandparents’ Terminator robot

This is not about your grandparents’ Terminator robot

For just about everyone in this new ever-connected age we live in, the topic of Artificial Intelligence (AI) seems to be something that we can't avoid. From news articles, to business reports and predictions, to Hollywood movies, AI has become the hottest topic of...

read more
What exactly is cyber resilience anyway?

What exactly is cyber resilience anyway?

The world of cybersecurity is complicated, to say the least. From the terms that we all use to the threats that those terms, in turn, represent when mitigating the risk of attacks, to the endless list of threat types that impact daily global business—there is a lot to...

read more
Don’t let your public online information empower hackers

Don’t let your public online information empower hackers

Our collective online lives have become largely ubiquitous—connecting us with colleagues, friends, and family, and others around the world. However, in doing so, many of our practices are still based on the pre-online times when “the world” didn’t have access to the...

read more
What does grammar have to do with Cyber Security?

What does grammar have to do with Cyber Security?

Over the years, anyone with an email account has inevitably received emails that can only be described as "questionable" at best—the grammar, style, and even formatting can at times be borderline laughable. For instance, to this day the famed and still poorly written...

read more

Corporate Headquarters

770 Palladium Drive
Ottawa, ON, K2V 1C8

1-877-225-4264

Have a cyber security question? We are here to help!

3 + 6 =