Understanding PIPEDA and CASL Summary of Privacy Laws in Canada In Canada, there are 28 federal, provincial and territorial privacy statutes that govern the protection of personal information in private,…
Top Cybersecurity Trends 2023 In recent years, we have seen cyber security explode in relevance, going from a topic for the techies to a boardroom mainstay. This can largely be…
How to Survive a Ransomware Attack Ransomware was first thrust into the spotlight when the WannaCry attack crippled the NHS in 2017. Since then, ransomware attacks have continued to hit…
How Hackers Bypass MFA (+ How to Stop it) The inherent weakness of using single passwords as login credentials has led to the rise of two-factor authentication to better secure…
The Importance of a Cybersecurity Risk Assessment Within many organizations, cybersecurity is something that is often overlooked – It is common to see organizations investing in sophisticated cybersecurity tools only…
What is Zero Trust? In the past, cybersecurity strategy has relied on the idea of a network perimeter in order to protect valuable data and critical assets. These would involve…
What is Managed SIEM? What are SIEM Solutions? Security Information and Event Managed (SIEM) are designed to gather log data across an organization's network infrastructure. This includes items like routers,…
How to choose vulnerability management In the modern era, businesses now rely on network environments that are impossibly complex and difficult to fully grasp. The proliferation of things like remote…
EDR vs MDR vs XDR The cybersecurity industry is notorious for coining terms and acronyms that can quickly become difficult to fully comprehend. This ultimately makes navigating the vendor landscape…
What is a DDOS Attack? With their surging popularity, you might be surprised to learn that DoS (Denial of Service) and DDoS (Distributed Denial-of-Service) attacks have actually been around for…