Smart Home Devices are a Cybersecurity Risk

The Smart Home Market is Exploding with Internet Capability. Only a few years ago, the only Internet-connected devices you might have in your home would be your computer and phone, and perhaps your television. These days, the “smart home” market is exploding with Internet capability embedded in a wide variety of appliances, equipment, and systems. […]

Healthcare Under Attack

Cyber criminals are at work on the healthcare industry. Already under pressure due to the COVID-19 pandemic, hospitals and healthcare-related interests have faced an onslaught of cyber attacks in recent weeks. Ruthlessly seizing an opportunity when resources and focus are elsewhere, cyber criminals have been at work in a wide variety of ways. Case 1: […]

Social Engineering – Phone

Phone-based social engineering threats are common. This is Part III of a three-part series on the cybersecurity risks presented by social engineering. Part I: Social Engineering – Email and Phishing Part II: Social Engineering – In-Person In this era of social distancing, we’ve become more reliant than ever on technology to communicate. In this environment, social […]

Social Engineering – In-Person

In-Person social engineering threats during COVID still has us concerned.   This is Part II of a three-part series on the cybersecurity risks presented by social engineering. Part I: Social Engineering – Email and Phishing In this era of social distancing, we’ve become more reliant than ever on technology to communicate. In this environment, social engineering […]

Social Engineering – Email and Phishing

Phishing is a common social engineering threat.   This is Part I of a three-part series on the cybersecurity risks presented by social engineering. In this era of social distancing, we’ve become more reliant than ever on technology to communicate. In this environment, social engineering techniques are creating heightened risks from a cybersecurity perspective. Social […]

Cybersecurity and Digital Identity Management in Government

Government

Cybersecurity and Identity Management Trends in Government The federal government continues to rely on online and digitized services. Government agencies access and process personal and other sensitive information. However, cybersecurity challenges affecting the security of critical information and infrastructure continue to be a thorn in the flesh. In a bid to ensure information security, the […]

Telecommunication and Cybersecurity

When a Teleco falls from grace, Hackers are ready to pounce.  The telecommunication sector should embrace technological advancements in cybersecurity in a similar vein with the way they adopt new technologies such as 5G and the Internet of Things (IoT) in their business. In 2017, total Canadian telecommunications revenues exceeded $67 billion, with a consistent […]

World Backup Day

Backup Your Data on World Backup Day and Everyday.    Tuesday, March 31 is World Backup Day! It’s an “official” day to help remind everyone about the importance of backing up your data. Having digital copies is one of your best responses to ransomware, and also puts you in a better position in case of […]

What You Need to Know about 5G

5G is the Fifth Generation of Mobile Technology   5G is the talk of the mobile world. To help make sense of the new technology, today we discuss some of the 5G terminology you may have run into lately. 5G: Let’s start really basic: 5G refers to the fifth generation of mobile technology. This generation […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.