St. John Victim of Cyber Attack

A massive cyberattack has ground many municipal operations to a halt in Saint John, New Brunswick. The suspected ransomw...

Stimulus Scam

Again we find hackers and cybercriminals in a power position to take advantage of our uncertainty of not only what is tr...

Saskatchewan Polytechnic Victim of Cyberattack

Saskatchewan Polytechnic was a victim of a cyberattack this past October 30th. Classes were canceled for a wee...

Security Skill Shortage

As the need for cybersecurity awareness increases across the entire business landscape, so does the need for strong prog...

Stelco Hit by Cyberattack

Major Canadian steel manufacturer Stelco experienced a nasty ransomware attack that brought its operations to a halt. Al...

Small Business, Big Risk

There is no way to emphasize enough, just how important it is for small businesses to be prepared for a cyberattack. But...

Vote for Cybersecurity

No, this is not a political post.  In fact, we know that there are some topics that don’t even merit an effort to t...

We Don’t Negotiate

The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to dis...

Smart Appliances & Cybersecurity

And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…al...

Home Office Security – Never Too Late to Evaluate

We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our ...

It Was to Be Expected

We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity – and COVID-19 gave them ...

A Global Community Effort

The US Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) division announce...

Impersonation Nation

Business Email Compromise (BEC) is not a new term. BEC scams have been growing in popularity for some time now. If you’r...

Before & After

Imagine if you had two emails that were worth a million dollars each. You would do everything that you can to protect th...

Scare Tactics

It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the n...

Dangers in Shadow IT

Shadow IT Shadow IT refers to IT technologies, solutions, services, projects and infrastructure utilized and managed wit...

Zoom passwords for sale on the Dark Web

You’ve almost certainly heard of Zoom over the past few weeks – Zoom, more properly Zoom Video Communications, Inc....

11 Things You Should Never Do at Work (or Home)

Your security and IT teams know all about the dangers of cybercrime, phishing, Business Email Compromise and malware, an...

COVID-19 and Remote Working

Coronavirus has brought remote working to the top of everyone’s mind. With many organizations already enabling or explor...

Why Outsource Your IT?

Why Outsource Your IT? If your company would like to consider outsourcing your maintenance and monitoring of your in-hou...