April 29, 2021
Your business’ online credibility relies heavily on the functionality, reliability, and security of your website. There are numerous Canadian web hosting companies for choosing the best web hosting services for this critical business asset. To make an informed decision when choosing between web hosting services, you’ll need to fully understand your web hosting requirements, both…
September 14, 2020
A firewall is the first line of defense that your company can employ against threats. Cybersecurity experts recommend that every company should have a robust plan in place, including a firewall. But there are now many different kinds of firewalls, as technology has evolved. If you select the wrong type, you could make your company…
February 8, 2019
It’s no secret that today’s cyberthreats are complex — malware developers are rapidly expanding their attack capabilities to bypass modern security measures. However, as organizations across industries and of varying sizes continue to expand their digital transformation efforts, there’s a consistent obstacle that limits IT teams’ ability to effectively evolve alongside these new threats — network…
January 5, 2018
What You Need to Know about Meltdown and Spectre What are Meltdown and Spectre? Meltdown and Spectre and are side-channel vulnerabilities that enable attacks based on information gained from the physical implementation of almost all CPUs manufactured since 1995. Essentially, normal interactions between operating system memory management and CPU optimization technologies could allow attacks…
November 21, 2017
The Internet is a powerful and sometimes scary tool that harbors education and mystery, while providing users anonymity for a price. Yes, the Internet may appear as a place for positive recreation and relaxation; however it also contains many dangers, such as ransomware, that can easily destroy computer systems. What is Ransomware and why does…
June 27, 2017
Updated June 28, 2017: New Ransomware, Petya: a global threat Many organizations worldwide are being crippled by a new variant of the Petya ransomware. The new variant, also known as Petrwrap *update: it seems some groups are referring to this outbreak as “NotPetya” and classifying it as a “Ransomworm”, has penetrated a number of vital network…
May 17, 2017
Protect your business from WannaCry and future ransomware threats We’re providing a quick action list to reduce the spread and impact of WannaCry, the ransomware which affected 200,000+ systems in 150 countries starting on Friday May 12. While the situation is very serious, the solution for stopping this breed of ransomware is now clearly documented and…
May 12, 2017
Is your data an easy target for social engineering hacks? For a process called ‘penetration testing’ a credit bureau recently hired a security company (run by a well-known former cybercriminal skilled in a variety of break in techniques) – to devise ways to breach security in their IT systems, to look for openings in…
January 13, 2017
5 steps to build your cyber security strategy With every passing day, businesses become more reliant on online resources. It’s very likely your business has either moved to or at least discussed shifting workloads to the cloud. Simultaneously the cyber security challenges are becoming more and more complex. A single security breach of your company’s data can have a far…