Even if you were already shoring up your defences — systems, networks and devices, in the office and remotely — the pandemic pushed this to the top of the IT security agenda with an unprecedented urgency. We look at what organizations can expect in the year ahead.
Read post
The top IT security projects identified by Gartner for 2021 reflect the incredible amount of change brought on by COVID-19: They’re heavily focused on process and risk management — and often require thinking beyond the technical aspects to consider the broader business.
Read post
COVID-related cyber attacks are on the rise. So as companies slowly move at least part of their workforce back to the office, it’s important to review lessons learned since the start of work-from-home orders to bolster IT security during this awkward transition phase.
Read post
Although more CISOs now have a seat at the table, what they do once they get there varies dramatically. At a recent ITAC event in Toronto, Cisco’s CISO explained how to work with line-of-business managers, make security a priority and cut internal vulnerabilities.
Read post
Fraudulent surveys, which pop up onto your computer screen and appear to come from your ISP, are becoming more commonplace. Not only are these annoying, but they carry other risks such as malware. Here’s what you can do if it happens to you.
Read post
Organizations in fleet management, retail, manufacturing and government are prime targets for significant data breaches this year, industry analysts predict.
Read post
Lance Spitzner makes a stop at the recent SecTor conference to discuss a longstanding issue in IT security: the human factor
Read post
Execs from TMX Group, Bank of Tokyo-Mitsubishi UFJ Canada and LoyaltyOne discuss their philosophy around data protection at SC Congress
Read post
A senior executive gives a rare glimpse into the myriad threats to its systems and customer data, and the most important tool to mitigate them
Read post
A flaw in OpenSSL could have been prevented — and so should all kinds of other vulnerabilities that keep coming up
Read post
As gadget-lovers marvel at the future of consumer technology at CES 2014, IT professionals need to be aware of the evolving nature of security threats that will follow
Read post
Authentication for banking transactions has become more complex due to increased risk, but the must be taken off the user. Biometrics could be the answer
Read post
SafeNet Labs’ report suggests that people don’t totally trust the security of hosted applications and infrastructure—but they use such services anyway
Read post
The CIO of ING Direct Canada and Info-Tech Research discuss the limits of two-factor authentication and why the Internet remains an area of risk for financial institutions
Read post
The recent SecTor conference in Toronto looks at the skill sets needed to contend with the array of vulnerabilities within corporate networks, as well as the ethical boundary lines
Read post
It’s great to have anytime, anywhere access, but security can’t be forgotten. Some practical advice for workers using wireless Internet services at the local café
Read post
Allstream’s recent Webinar looked at the major challenges around DDoS and other threats. Catch up on some of the best advice offered through the Q&A
Read post
Stay secure when you allow employees to bring their own applications, bandwidth, clouds or devices to work
Read post
Today’s IP news roundup highlights some of the latest headlines in IT management, VoIP, cloud computing and more:
According to Computerworld’s Forecast 2014 survey, 36% of organizations will increase their IT budgets in 2014. Meanwhile, another 50% will hold their budgets steady. The survey...
Read post
A lawyer with Torys LLP discusses what IT security contracts tend to spell out — and what may be missing. The difference between the two could be critical
Read post
The proliferation of information and tools to conduct DDoS attacks is accelerating on the Internet, giving inexperienced hackers the power to knock off your network
Read post
Today’s IP news roundup highlights some of the latest headlines in network security, convergence, virtualization and more:
An Oracle study has revealed that enterprises allocate 67% of their IT resources to protecting their networks, although they believe that a database breach would cause...
Read post
BeyondTrust Software Inc. recently published the results of its “Headline vs. Reality: Survey Report” on how IT security professionals prioritize. The survey “identifies what threats they’re most concerned about, where they believe their IT assets are vulnerable, and what security...
Read post
A sergeant with Ottawa’s high-tech crimes unit explains the limits of what law enforcement officials can do to contend with IT security issues, and why DDoS attackers won’t give up easily
Read post
Financial institutions face two major cyber threats – DDoS attacks and advanced persistent threats. This article outlines why these threats are dangerous and what you must do to protect your data
Read post