Government websites, small businesses, school boards, public health organizations — all are potential targets.
Matthew Held is the CEO and Co-Founder of Manawa Networks, a full service IT consulting firm, based in Toronto, that serves small and medium organizations across Canada. Matthew writes about how technology makes people and organizations better. For more, contact firstname.lastname@example.org or www.manawa.net
Called Meltdown and Spectre, the flaws were among the most significant hardware vulnerabilities ever discovered.
01/18/2018 12:15 EST
This virus has the potential to affect many users who use Microsoft Office documents.
11/27/2017 09:33 EST
Business leaders often get confused about backups, disaster recovery and business continuity planning until after a disaster happens.
07/26/2017 11:54 EDT
Ransomware is effective because it often arrives via an infected email attachment, like a Microsoft Word or Excel document, appearing to be from someone you know. Once you open the attachment on a vulnerable computer, it starts to run and can lock the files on your computer and network server without your knowledge.
05/23/2017 05:37 EDT
Criminals take the path of least resistance. The weakest link is the employee. Data breaches are mostly the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report. The best way for organizations to protect themselves is to create and foster a culture of cyber security awareness.
05/15/2017 10:36 EDT
While Canadian ISPs cannot share customer information without their consent, Canadians regularly travel to the US and use WIFI or cellular data on electronic devices and computers. In cases where they use cellular data or WIFI via American ISPs, their personal information may be accessible. Selling customer data to third parties is how Google and Facebook make money. However, information collected by an ISP is much more detailed than what Facebook and Google collect.
04/12/2017 04:18 EDT
Cybercrime and significant breaches have plagued various sectors in the past five years in financial, retail, healthcare, entertainment, and government. For many, 2016 will go down as the year that computer hackers affected the outcome of the U.S. presidential election.
03/09/2017 12:39 EST
Have you noticed how most people don't carry as many things as they used to while traveling? Things like flashlights, cameras, maps, memory sticks, newspapers, magazines, games and books. These items and others have all been replaced by smart phones and devices. While they make our lives more convenient and easier, they also collect information about us.
02/03/2017 07:28 EST
Data loss is a fact of life today for organizations. Data loss is caused for a range of reasons including human error, natural disaster, equipment failure and a cyber attacks to name a few. For solution providers, several 2017 trends show that backup and recovery options will be top of mind for small, medium and larger businesses.
12/28/2016 12:38 EST
The popular myth for a non-profit organization executive is to ask, "Why anyone would want to hack us?" The nefarious nature makes non-profits easy targets because they often invest less in employee training and IT security.
11/29/2016 06:26 EST
Corporate security and travel professionals are expected to continuously learn, adapt to new technologies and find best practices that safeguard the security and privacy of employee travellers. Companies can follow five best practices to effectively keep monitor, assist and protect personnel and their data while travelling.
10/21/2016 01:43 EDT
In 2015, 205 billion email messages were sent and received daily, according to the Radicati Group. Messages are sent and received from computers, mobile, tablets and many other devices. The current U.S. election has seen Hillary Clinton's presidential race mired in an email scandal involving the user of a personal email server while she served as secretary of state from 2009 to 2013.
09/20/2016 01:43 EDT
Today, employees and organizations want more flexibility and work-life balance. They want to work anytime, anywhere. But they also want privacy and information security, at a time when cybercrime is a growing concern. Organizations and their employees can reduce the mobile threat using three strategies.
08/15/2016 01:35 EDT
Most people felt the outcome of Brexit with U.K. voting to leave the E.U. would have a minimal impact outside its borders. Instead, financial markets, defence, technology, cyber security and privacy are affected because the U.K. is globally interconnected.
07/14/2016 04:46 EDT
Concerns are warranted as drones continue to grow in popularity. Individuals and organizations are being vigilant in their need to detect, protect and respond quickly to security and privacy issues.
06/10/2016 12:59 EDT
Ransomware is one of the fastest growing areas of cyber crime. The intended target is often small and medium sized businesses, because they have fewer resources compared with larger organizations. Historically, the root word ransom refers to a criminal demanding a payment in exchange for releasing someone or something that has been taken.
05/09/2016 06:43 EDT
Enterprise resourcing planning software has lagged behind cloud computing solutions in other business areas like CRM and storage. Cloud ERP will grow in the next few years because large vendors like Microsoft, Oracle, and SAP are ramping up product offerings.
04/14/2016 03:26 EDT
Enterprise Resource Planning is business process management software that allows organizations to manage and automate back office functions like product planning, marketing, sales, distribution, human resources and manufacturing into a unified, comprehensive structure.
03/08/2016 01:21 EST
As 2016 gets underway, organizations are searching for new ways to grow, compete, and win. They know technology will play a role. While it's impossible to have a crystal ball to predict the future, some key trends have emerged in the coming year that are relevant for small and medium-sized organizations. Here are five ones to watch.
01/19/2016 12:19 EST
SUBSCRIBE AND FOLLOW