CALL US 647-847-4660

Uzado's Blog

Everything you need to know about cybersecurity tools, news, and standards


Black Hat and DefCon 2018 Round-Up

By Maria Catricala August 15, 2018

Black Hat and DefCon 2018 are now over, but many interesting news stories came out of the..

THE BIGGEST THREAT FACING DENTAL PRACTICES: Part 2

By Danny Pehar August 1, 2018

TARGET + ATTACK + VULNERABILITY = IMPACT

In part 1 of this blog we talked about the “Target” and..

Ontario Home Care Provider Breached, Patient Records Held for Ransom

By Maria Catricala July 23, 2018

Last Month, CarePartners, One of Ontario’s most prominent home care service providers, announced..

Is Cash Becoming Worthless? Or is Cashless Becoming Priceless?

By Alix Postan June 25, 2018

July 2017 marks the month where debit card transactions have inevitably surpassed cash payments,..

How to Simplify Risk Management

By David Millier June 20, 2018

Risk management is a vital part of your business operations. Rather than focusing solely on..

How to Avoid These 5 Types of Cyber-Attacks

By Alix Postan June 13, 2018

Did you know that any online business activity could increase your susceptibility to these forms..

How to Get Executives to Stop Under-investing in Cybersecurity?

By Maria Catricala June 11, 2018

When it comes to investing in cybersecurity, it’s hard to believe that some executives are still..

The Ultimate Guide to Effective Vulnerability Management

By David Millier May 18, 2018

Implementing vulnerability management is a huge undertaking for most businesses. Ensuring that your..

Search

Recent Posts

Subscribe to Email Updates