It might sound inconceivable to some, but one of the most significant and preventable causes of companies falling victim to cybercrime is when employees themselves circumvent the firewall. Now, why would anyone do that? Picture an accountant, working busily away, trying to get hold of some last-minute data to complete a report that is already…
Author: Steve Prentice
Cybersecurity: What Executives and the IT Department Need to Do
Over the years, the relationship between IT, cybersecurity and the executive C-Suite has changed, but as the perpetual slate of data breaches and hacking incidents shows, there is still a long way to go. Senior executives naturally have a lot on their plate, and IT has typically been one of many silos in an organization…
The Impact of IoT and IIoT on Security
The Internet of Things (IoT) and the Industrial Internet of Things (IIOT) usher in new levels of convenience for consumers and industry alike. But these come with hidden dangers. Smart home devices like door locks, porch-cams, and smart thermostats make life a little easier and safer on the home front, while cloud-based devices for industry,…
Cybersecurity: Are Canadians Ready?
Picture this: the power goes out in your house. It’s 11:00 at night, so it’s dark. You look outside, and you see that every other house is dark too. There’s light coming from the odd solar powered porch light, but the streetlamps and everything else are out. You pull out your phone to make a…
Why Data Breaches Continue to Happen
Think for a moment about how you would react if you suddenly discovered your wallet or purse was missing. You frantically check your pockets, under the seat of the car, and you mentally retrace your steps. Where did you go today? Where might you have left it? Your panicked mind alternates between the desire for…
Cyber Security Outlook for 2019
With the new year now underway and the memories of the holiday season replaced by the realities of winter, taxes, and work, it’s a good time to reflect on the highs and lows of 2018 to envision what 2019 might look like. Last year: Misappropriation of data was a widespread issue in 2018. A ceaseless…