Updated June 28, 2017: New Ransomware, Petya: a global threat Many organizations worldwide are being crippled by a new variant of the Petya ransomware. The new variant, also known as Petrwrap *update: it seems some groups are referring to this outbreak as “NotPetya” and classifying it as a “Ransomworm”, has penetrated a number of vital network…

Missed our webinar “Guarding your business against ransomware”?   We’ve got the presentation available for download here and the video will be ready shortly.  In the meantime, feel free to contact us with your questions on Ransomware and how Layered Security – combined with end user training – can safeguard your business not only from ransomware but many of the…

Protect your business from WannaCry and future ransomware threats We’re providing a quick action list to reduce the spread and impact of WannaCry, the ransomware which affected 200,000+ systems in 150 countries starting on Friday May 12.  While the situation is very serious, the solution for stopping this breed of ransomware is now clearly documented and…

  Is your data an easy target for social engineering hacks? For a process called ‘penetration testing’ a credit bureau recently hired a security company (run by a well-known former cybercriminal skilled in a variety of break in techniques) – to devise ways to breach security in their IT systems, to look for openings in…

Making the most out of customer satisfaction surveys.   Internal QA scores and customer satisfaction surveys don’t always reach the same conclusions. For example, an end-user customer at a hospital has trouble logging into his medical application. He calls up the help desk. The agent checks the customer’s user enrollment. He discovers the ID in…

3 easy ways to get more from your tech support Hi-tech product & service companies recognize that providing technical support is not just to address user issues in areas such as installation, connectivity, compatibility or product registration. It’s a great place to harness and mine valuable customer insights and product data. With the proper attention to data collection…

(How not to get caught in) The Catch 22 of tech support economics.   ‘After-market tech support’ was one of the big subjects of discussion at the recent Consumer Electronics Show (CES) – a global powerhouse gathering of consumer technologies.  For good reason. With each new roll out of a high-end tech product or service…

Markham, Ont. – January 31, 2017 – Pathway communications has completed the HIPAA & PIPEDA compliance audit for its Data Centre, Private Cloud infrastructure and processes.  As of February 1st all client data hosted within Pathway’s Markham Data Centre including Cloud solutions, are fully compliant with the requirements specified in HIPAA and PIPEDA for handling and storage…

New designation guarantees optimal security, privacy and availability for customers    – Pathway Communications today announced that the company has successfully completed the requirements for Payment Card Industry Data Security Standard compliance. PCI DSS is a global financial information security standard intended to keep debit and credit card holders safe from online security breaches. It…

5 steps to build your cyber security strategy With every passing day, businesses become more reliant on online resources. It’s very likely your business has either moved to or at least discussed shifting workloads to the cloud. Simultaneously the cyber security challenges are becoming more and more complex. A single security breach of your company’s data can have a far…

Copyright © 2017 Pathway Communications. All Rights Reserved. Pathway Legal