Recently, our team hosted a live webcast on Office 365 security. During the webcast, the discussion generated an extremely high number of questions from the audience, and we wanted to…
Office 365 security is not something that should be taken lightly. However, with thousands of businesses turning towards the productivity and technology giant for online email, file sharing, [...]
As Cyber Security Month comes to a close, let’s examine some of the trends in the cybersecurity space in Canada. In early October, three hospitals in Ontario were hit with…
Being responsible for your workplace technology can be scary. Not only do you have to keep your team productive, but you also need to keep your data safe. In today’s…
SD-WAN is a software-defined (SD) networking approach to managing a wide area network (WAN). WAN is a telecommunications network that connects users over large distances; in this case, it [...]
By Scott Anderson, Manager of Compliance at IT Weapons Computer passwords first popped up almost 60 years ago, and in the decades that followed, they have constantly been compromised. [...]
Last year, in an effort to help with the ongoing struggle of increasing security awareness, we put together a collection of Security Statistics compiled from notable security sources from [...]
Every October, tech minded folk from all known corners of the world gather to discuss, honor, and wallow in self pity over one universal, yet sobering truth…the internet is terrifying.…
Nothing grinds the proverbial gears quite like being duped. Having someone take advantage of your kindness, desires, obedience, curiosity, or fears exposes an angry hole into the depths of [...]