What is a Certified Information Systems Security Professional?

cissp certified it specialist

Mitigating risk has always been an important part of running a business in the Greater Toronto and Hamilton Area. It used to be that this meant having secure locks and perhaps security personnel to monitor the premises. Today though, some of the most damaging attacks on business come in the form of data breaches and […]

The Complete Cyber Insurance Coverage Checklist

man on phone

The average data breach costs Canadian companies $5.64 million–enough to shutter most small businesses and (at least) rock the boat for most medium-sized companies. The answer to lessening cyber risks has come in the form of cyber insurance, with over 59% of businesses having opted for coverage. But are you sure your cyber security insurance […]

What is a Vulnerability Assessment?

As an IT professional, you know how important security and risk management are to your networks’ infrastructure and the company’s information security. You should also know that to keep the integrity and security of your network, you need to carry out regular cyber security vulnerability assessments. What Is a Vulnerability Assessment? A vulnerability assessment is […]

How to Conduct Network Pen Testing

What is penetration testing in network security? Network penetration testing, often shortened to pen testing, is the process of finding potential security vulnerabilities in networks, systems and applications by getting network penetration testers, or ethical hackers, to see if they can break through your cyber defenses using real-world techniques. What are the network penetration testing […]

Vulnerability Assessment Methodology Best Practices

If there was ever a reason needed to perform a vulnerability assessment of your systems this would be it–nearly 80% of Canadian businesses experienced a successful cyber attack last year. Knowing what vulnerability assessment methodology you should employ is key to closing gaps in your security. Vulnerability scanners are automated tools that create inventories of […]

Sample Security Assessment Report

Business cybersecurity is a constantly evolving challenge that requires outpacing hackers and other malicious actors seeking to access your systems and cause disruption and loss. One of the key lines of defence in securing a business is plugging any weak spots in the network, and finding those vulnerabilities is best done through an IT security […]

Common Mistakes Leading to Public Breaches that Cost You Money

man looking at monitor

                  In June, CPA Ontario (Chartered Professional Accountants of Ontario) announced they had been breached, the data of nearly 330 thousand individuals were posted online. Names, addresses’, emails and employment information were stolen, leaving these people vulnerable to phishing scams and other forms of attack. This is […]

A History of Endpoint Security into the Future

lines of code on computer screen

End-point security has been around for a long time; it was created to combat malicious software (malware) designed by Cyber Criminals to harm devices, networks or services. It started in the late 1980s with anti-virus software. It would require, an IT professional to install the software on a machine that would scan all data crossing […]

Password Security – Are Your Passwords Secure?

man looking at notes

Password Security Is More Important Than Ever With the spark of the global pandemic we know as COVID-19, many employers have opted to have their staff work from home. With this comes the use of our home Wi-Fi; no longer being used just for entertainment; it is now the means to connect with our workplace […]

Benefits of Remote Tech Support For Small Business

Remote IT support has been a standard solution for small-to-medium-sized businesses (SMBs) for years now. In a 2019 survey of over 500 small business owners, 37% used managed IT services. In fact, IT services were the most popular business process to outsource. Of course, things have changed drastically over the past year – and remote […]