Organizations in fleet management, retail, manufacturing and government are prime targets for significant data breaches this year, industry analysts predict.
Read post
Mirai, Mirai, on the wall. Who’s the least secure of all?
Read post
Our monthly roundup of the best discussions in the online community, from the threat landscape in 2017 to admissions of guilt over poor password policies.
Read post
It’s not that corporate cybersecurity teams aren’t looking hard enough for threats and breaches, according to a survey by Accenture. It’s that they’re not looking in the right place.
Read post
Our monthly roundup of the best discussions on the online community, from the rise of ransomware, to new malware variants and the continued use of ‘password’ as a password.
Read post
Cracks — such as arduous vetting and suspect certificate authorities — are starting to show in the digital certificate system, which authenticates the identity of websites that interact with our mobile devices. Here’s what you need to know to keep your network communications safe.
Read post
Today’s hackers don’t just encrypt your files and hold them hostage, promising to supply a decryption key after ransom is paid. Many of them also encrypt the file names and extensions and delete all shadow copies of your files. Here’s what you can do to both defend and mitigate.
Read post
It’s adaptable. It’s everywhere. And it’s sparking a lot of creative thinking.
Read post
Security culture is not just related to awareness and training — it’s the sum of subconscious human behaviours that people repeat based on prior experiences and collectively held beliefs, according to one Gartner analyst. Here’s what to do about it.
Read post
Software-defined networking, voice-over-IP and enterprise mobile security systems come in for a beating during the annual gathering of IT security experts.
Read post
We talk to Mike Vamvakaris about the current threat landscape, how it’s evolving and why Zayo is launching a Global Security Operations Center.
Read post
Half of Canadian companies feel confident in their ability to protect against ransomware, according to a new survey. Yet more than a third of those surveyed were hit with ransomware in the past year, and attacks are much higher here than in the U.S. What’s the disconnect?
Read post
We know that passwords are dead. They just haven’t stopped moving yet. Or rather, they move too much — into the wrong hands.
Read post
A new twist on software-defined networking makes the hybrid wide-area network feasible for organizations worried about data security.
Read post
The average enterprise has more than 2,000 unsafe or malicious apps installed on its mobile devices, say researchers. Here’s how to balance the tradeoff between usability and security.
Read post
Web application attacks are becoming more popular — and they can be significantly more difficult to detect. Along with volumetric attacks, they are contributing to a relatively new class of attack, known as ‘dark’ or ‘smokescreen’ DDoS. Here’s what to do about it.
Read post
Historically, companies haven’t been allowed to strike back against hackers and cyber attacks. Should they be allowed to launch offensive cyber measures against their attackers — effectively hacking back — to discourage and possibly disable those attackers?
Read post
Building an IT-based border to keep the bad stuff out just isn’t possible anymore, according to panelists at the Canadian Telecom Summit held in Toronto earlier this month. Here’s why attitudes — and approaches — toward security need to change.
Read post
This malicious software historically targeted individuals — locking them out of their own devices unless they made an online payment, typically through Bitcoin — but it has more recently begun to target companies, large institutions and enterprise networks.
Read post
More than 25 billion smart devices will be online by 2020, and Gartner says most businesses aren’t investing enough in IoT security — we’ve already seen some ugly missteps. Here’s why identifying vulnerabilities and upgrading your cyber-security framework should be a priority.
Read post
And that’s not a bad thing. Get to know software-defined security, a new concept in data protection in which operations are decoupled from hardware, allowing companies to create dynamic security domains for mobile and cloud networks.
Read post
Many organizations prohibit workers from using free Wi-Fi hotspots. But these days, that’s not realistic — and it’s not the only way to secure your digital assets.
Read post
While the number of attacks is decreasing, they’re becoming more precise in their targeting, more advanced in their methodology and more financially damaging to both individuals and corporations, according to a new report on breaches and vulnerabilities in Canada.
Read post
Canadian organizations are turning to managed security service providers (MSSPs) for round-the-clock resources and dedicated security staff to manage their cyber-security concerns.
Read post
Malware is becoming more creative, able to morph and transform once it sneaks through perimeter protection. Cloud-based intelligence, on the other hand, provides adaptive threat protection against specific threats to endpoint devices connected to the cloud.
Read post