
We’re Hosting a Live Webinar with Pentera on May 11th from 1:00-2:00pm EST! Are you concerned about the gaps that exist in your security posture? Do you want to learn…
We’re Hosting a Live Webinar with Pentera on May 11th from 1:00-2:00pm EST! Are you concerned about the gaps that exist in your security posture? Do you want to learn…
Dark Social: How Cyber Criminals use Social Media to Target Businesses If you think about it – it’s silly how willing most of us are to post key details of…
5 Common Cybersecurity Myths (Plus How to Avoid them!) It should come as no surprise that cyber attacks have only grown more frequent in 2023. With the rise of AI…
How ChatGPT affects the Cybersecurity Landscape ChatGPT has taken the internet by storm. A Large Language Model (LLM) released by OpenAI in November 2022, ChatGPT has gone on to amass…
Artificial Intelligence and Cybersecurity: Is ChatGPT a threat? In recent years, we have seen the enterprise level attack surface grow rapidly. More people are working remotely than ever, meaning that…
Understanding PIPEDA and CASL Summary of Privacy Laws in Canada In Canada, there are 28 federal, provincial and territorial privacy statutes that govern the protection of personal information in private,…
Top Cybersecurity Trends 2023 In recent years, we have seen cyber security explode in relevance, going from a topic for the techies to a boardroom mainstay. This can largely be…
How to Survive a Ransomware Attack Ransomware was first thrust into the spotlight when the WannaCry attack crippled the NHS in 2017. Since then, ransomware attacks have continued to hit…
How Hackers Bypass MFA (+ How to Stop it) The inherent weakness of using single passwords as login credentials has led to the rise of two-factor authentication to better secure…
The Importance of a Cybersecurity Risk Assessment Within many organizations, cybersecurity is something that is often overlooked – It is common to see organizations investing in sophisticated cybersecurity tools only…