Blog

  • security audit checklist

    Understanding BGP Hijacking: Threats and Prevention

    Understanding BGP Hijacking: The Threat and How to Prevent ItIn today’s interconnected world, the integrity of internet routing is crucial. However, incidents like BGP

  • Cybercrime Escalation: How Municipal Governments Can Combat Rising Threats

    Municipal governments are increasingly under siege from cybercriminals,

  • Understanding MFA Fatigue Attacks: A Growing Cybersecurity Threat

    Multi-Factor Authentication (MFA) has become a cornerstone of

  • Insights from Proofpoint’s 2024 Voice of the CISO Report

    Executive Summary The 2024 Voice of the CISO

  • cfo

    CFOs Must Treat Cybersecurity as a Business Decision: Insights from Gartner’s CFO & Finance Executive Conference

    In today's increasingly digital world, cybersecurity is no longer just a technical issue; it has become a critical business decision. This perspective was emphasized

  • Google cloud

    Google Cloud’s Big Blunder

    Google Cloud recently faced significant backlash due to an unprecedented error that led to the accidental deletion of the private cloud account of UniSuper,

  • Cyber Security

    Boost Your Cyber Smarts: Why Everyone Needs Security Training

    In today’s digital world, the bad guys are getting smarter, and that means we’ve all got to step up our game. At Fusion Computing,

  • small business owner on a tablet

    Securing Your Canadian SMB: Top 3 Effective Cybersecurity Measures

    In an era where cyber threats are increasingly sophisticated and relentless, Canadian small and medium-sized businesses (SMBs) must prioritize robust cybersecurity strategies. By focusing

  • business partners

    Beyond the Breach: Navigating Cybersecurity and Director Responsibilities in a Digital Age

    In recent years, the digital landscape has transformed not only how businesses operate but also the nature of the threats they face. Cyber attacks

  • breached warning on laptop

    The Rising Threat of Brute-Force Attacks on VPNs and SSH Services

    In an increasingly interconnected world, the importance of robust cybersecurity measures cannot be overstated. A recent report by Talos Intelligence highlights a concerning trend

  • Smart Speaker

    New Gadget Safety Tips

     In our latest Hot Topic video, Mike Pearlstein, Founder and CEO of Fusion Computing, discusses the things you can do to secure yourself

  • digital handshake

    Fusion Computing: Your Technology Success Partner

    In today's digital landscape, Technology Success Partners (TSPs) have emerged as indispensable allies for businesses across all sectors. TSPs represent the evolution of traditional

  • national cyber security awareness month

    October is Cybersecurity Month

    In addition to fall colours, cooler weather, and pumpkins, October 2023 will be a time to reflect on real threats to businesses and identities

  • it specialist

    What is a Certified Information Systems Security Professional?

    Mitigating risk has always been an important part of running a business in the Greater Toronto and Hamilton Area. It used to be that

  • man at desk

    The Complete Cyber Insurance Coverage Checklist

    The average data breach costs Canadian companies $5.64 million–enough to shutter most small businesses and (at least) rock the boat for most medium-sized companies.

  • hand holding smart phone

    The Top 10 Cloud Migration Challenges Most Likely to Cause You Trouble

    Undergoing a complete cloud migration is, at once, an essential and incredibly involved task (both in terms of time and money). There are many

  • underlining figures

    How to Plan for Your IT Needs with Smart IT Budgeting

    When it comes to creating an IT budget, it's important to remember that your business performance goals are the top priority. Many businesses make

  • business meeting

    Why Executive Buy-In for IT Initiatives is Essential

    Did you know that executive involvement is essential for new IT initiatives ? Many leaders mistakenly believe that they can distance themselves from overall

  • man looking at computer

    Outsourcing IT Department vs. In-House IT: Everything You Need to Know

    Making the decision to outsource your IT department is a big one. It can be difficult to weigh the pros and cons, especially when

  • laptop graphic

    A Brief History of Antivirus Software

    Antivirus software is one of the most important tools that businesses have in their cyber security arsenal. But how did we get to where

  • man on laptop

    The 6 Biggest Reasons Why Cyber security is Important for Data & Financial Protection

    The importance of cyber security for businesses (and small businesses especially) is more relevant today than it has ever been before. Of all the

  • laptops

    The 10 Biggest and Most Common IT Problems Plaguing Businesses Today

    Technology is great…when it works. When it doesn’t work, you’re stuck dealing with common technology problems that are causing you more downtime than they

  • security audit checklist

    Understanding BGP Hijacking: Threats and Prevention

    Understanding BGP Hijacking: The Threat and How to Prevent ItIn today’s interconnected world, the integrity of internet routing is crucial. However, incidents like BGP

  • Municipal Building

    Cybercrime Escalation: How Municipal Governments Can Combat Rising Threats

    Municipal governments are increasingly under siege from cybercriminals, as highlighted by recent attacks. The Town of Arlington, MA, recently lost $445,000 in a Business

  • mfa example

    Understanding MFA Fatigue Attacks: A Growing Cybersecurity Threat

    Multi-Factor Authentication (MFA) has become a cornerstone of modern digital security, adding an extra layer of protection to user accounts beyond just a password.

  • cyber security shield

    Insights from Proofpoint’s 2024 Voice of the CISO Report

    Executive Summary The 2024 Voice of the CISO report from Proofpoint, surveying 1,600 CISOs globally, provides critical insights into the evolving landscape of cybersecurity.

  • cfo

    CFOs Must Treat Cybersecurity as a Business Decision: Insights from Gartner’s CFO & Finance Executive Conference

    In today's increasingly digital world, cybersecurity is no longer just a technical issue; it has become a critical business decision. This perspective was emphasized

  • Google cloud

    Google Cloud’s Big Blunder

    Google Cloud recently faced significant backlash due to an unprecedented error that led to the accidental deletion of the private cloud account of UniSuper,

  • Cyber Security

    Boost Your Cyber Smarts: Why Everyone Needs Security Training

    In today’s digital world, the bad guys are getting smarter, and that means we’ve all got to step up our game. At Fusion Computing,

  • small business owner on a tablet

    Securing Your Canadian SMB: Top 3 Effective Cybersecurity Measures

    In an era where cyber threats are increasingly sophisticated and relentless, Canadian small and medium-sized businesses (SMBs) must prioritize robust cybersecurity strategies. By focusing

  • business partners

    Beyond the Breach: Navigating Cybersecurity and Director Responsibilities in a Digital Age

    In recent years, the digital landscape has transformed not only how businesses operate but also the nature of the threats they face. Cyber attacks

  • breached warning on laptop

    The Rising Threat of Brute-Force Attacks on VPNs and SSH Services

    In an increasingly interconnected world, the importance of robust cybersecurity measures cannot be overstated. A recent report by Talos Intelligence highlights a concerning trend

  • Smart Speaker

    New Gadget Safety Tips

     In our latest Hot Topic video, Mike Pearlstein, Founder and CEO of Fusion Computing, discusses the things you can do to secure yourself

  • digital handshake

    Fusion Computing: Your Technology Success Partner

    In today's digital landscape, Technology Success Partners (TSPs) have emerged as indispensable allies for businesses across all sectors. TSPs represent the evolution of traditional

  • national cyber security awareness month

    October is Cybersecurity Month

    In addition to fall colours, cooler weather, and pumpkins, October 2023 will be a time to reflect on real threats to businesses and identities

  • it specialist

    What is a Certified Information Systems Security Professional?

    Mitigating risk has always been an important part of running a business in the Greater Toronto and Hamilton Area. It used to be that

  • man at desk

    The Complete Cyber Insurance Coverage Checklist

    The average data breach costs Canadian companies $5.64 million–enough to shutter most small businesses and (at least) rock the boat for most medium-sized companies.

  • hand holding smart phone

    The Top 10 Cloud Migration Challenges Most Likely to Cause You Trouble

    Undergoing a complete cloud migration is, at once, an essential and incredibly involved task (both in terms of time and money). There are many

  • underlining figures

    How to Plan for Your IT Needs with Smart IT Budgeting

    When it comes to creating an IT budget, it's important to remember that your business performance goals are the top priority. Many businesses make

  • business meeting

    Why Executive Buy-In for IT Initiatives is Essential

    Did you know that executive involvement is essential for new IT initiatives ? Many leaders mistakenly believe that they can distance themselves from overall

Join our Newsletter to Learn More

Get our latest content delivered to your inbox.