Welcome to Our Cyber Security Blog

Articles written by our industry professionals to help keep you and your organization safe from cyber threats.
Are IT departments pushing people into the shadows?

Are IT departments pushing people into the shadows?

If you've ever wondered what the single most effective trigger is to make the blood pressure of IT and compliance professionals simultaneously skyrocket, the answer is simple: mention the term Shadow IT and see what happens. And to be completely honest, as a cyber...

read more
What if I told you to embrace rogue IT?

What if I told you to embrace rogue IT?

Ah, the cloud—the never-ending topic of choice for those organizations continually contemplating the dreams and nightmares that it offers. But why is that? You would think by now, the roaring 20s, that the cloud would be something that is just a part of life. After...

read more
This is not about your grandparents’ Terminator robot

This is not about your grandparents’ Terminator robot

For just about everyone in this new ever-connected age we live in, the topic of Artificial Intelligence (AI) seems to be something that we can't avoid. From news articles, to business reports and predictions, to Hollywood movies, AI has become the hottest topic of...

read more
What exactly is cyber resilience anyway?

What exactly is cyber resilience anyway?

The world of cybersecurity is complicated, to say the least. From the terms that we all use to the threats that those terms, in turn, represent when mitigating the risk of attacks, to the endless list of threat types that impact daily global business—there is a lot to...

read more
Don’t let your public online information empower hackers

Don’t let your public online information empower hackers

Our collective online lives have become largely ubiquitous—connecting us with colleagues, friends, and family, and others around the world. However, in doing so, many of our practices are still based on the pre-online times when “the world” didn’t have access to the...

read more
What does grammar have to do with Cyber Security?

What does grammar have to do with Cyber Security?

Over the years, anyone with an email account has inevitably received emails that can only be described as "questionable" at best—the grammar, style, and even formatting can at times be borderline laughable. For instance, to this day the famed and still poorly written...

read more
This is not just any article about Quid Pro Quo

This is not just any article about Quid Pro Quo

So, before you think I'm about to embark down some dark path of political rants, I can assure you I have no interest nor desire to do so. Instead, as 2019 comes to an end, I thought it best to embark instead down a path of education as it pertains to a very real, and...

read more
What is that? And why is it breaching your network?

What is that? And why is it breaching your network?

It's no surprise that mobile devices are everywhere: just this morning I counted 20 in plain sight within 10 feet of my office. And that was just mobile phones. That didn't include laptops, tablets, hard drives, thumb drives... you get the picture. But it doesn't end...

read more
Prioritizing Security Risks—Not Vulnerabilities

Prioritizing Security Risks—Not Vulnerabilities

With an attack surface that’s borderless, complicated, and connected to everyone and everything, it’s difficult, verging on the impossible, to fully protect the business from data breaches and their far-reaching consequences. Furthermore, if the company is relying on...

read more

Corporate Headquarters

770 Palladium Drive
Ottawa, ON, K2V 1C8

1-877-225-4264

Have a cyber security question? We are here to help!

5 + 15 =