Facebook is known for generating detailed and relevant analytics about their users. They’ve always..
What is the Cloud Controls Matrix?
The Cloud Security Alliance Cloud Controls Matrix (CSA CCM) is..
What does ‘compliance’ mean in terms of cybersecurity?
Much like the commonly-known definition,..
Courtesy of Howard Solomon, from IT World Canada:
CISOs often dream about adding hands to the..
Equifax. In one word that sums up the terrible..
Canadian businesses: it’s time to prepare for GDPR. Why? In May 2018, the EU will mandate that ALL..
Incident Management (IM) software is critical for technical support teams who are responsible for..
Everywhere you look, it seems someone is using some form of a fitness tracker. Whether it’s a fad..
Often times, organizations face the challenge of needing additional resources but have a..
Answer: Setting a weak password!
2017 was a year that saw many high-profile cybersecurity breaches in various industries. Retailers..
You likely use encryption every day, whether you know it or not. Banking apps, WhatsApp, credit..
Phone: 647.847.4660 x121 Fax: 416.352.1470Email: firstname.lastname@example.org
9131 Keele Street, Suite A5Vaughan, ON L4K 0G7