Protect Your Personal Data

8 Smart Ways to Protect Your Personal Data

Protect Your Personal Data Protect Your Personal Data, because the data breach at credit reporting agency Equifax affected 143 million Americans, giving hackers access to Social Security numbers, addresses, and credit file data. Identity thieves can use this information to destroy your credit,…


0 Comments5 Minutes

Common Security Breaches

Common Security Breaches You Need to Be Aware Of

Common Security Breaches Common Security Breaches caused In 2016, search engine and email giant organization Yahoo had their system compromised by a data breach, resulting in stealing the information of about 500 million users. Yahoo isn’t the only victim of a security breach. Other examples…


0 Comments8 Minutes

types of Firewall Architecture

Types of Firewall Architecture

Types of Firewall Architecture In its most basic sense, a firewall exists to prevent unwanted access to your computer network. Firewalls isolate your computer from the network with a layer of code that inspects all incoming and outgoing traffic. Whether attacks come in the form of malware hidden in…


0 Comments4 Minutes

Canada Day Flag

10 Fun Facts About Canada Day

Canada Day! Canada Day long weekend is finally here. With the fireworks scheduled tonight, hamburgers on the grill, and cold drinks in the cooler, there is so much to love about our national holiday. Although most Canadians celebrate the national holiday in one way or another, many are not aware…


0 Comments2 Minutes

secure password

Secure Passwords |52% of users reuse their passwords

Secure Passwords Most Internet users these days still haven’t fully understood the importance of establishing effective mechanisms to create secure passwords. In order to understand how complex the risk is, researchers at Virginia Tech University and Dashlane analysts have carried out one of the…


0 Comments6 Minutes

White Hat Hacker

What are White Hat Hackers?

Contrary to popular belief, not all hackers are malicious. Hackers use their skills to help protect against attacks are called “white hat”, while hackers looking to take down networks steal data, or compromise systems are called “black hat.”  White hat hackers work to proactively find security…


0 Comments6 Minutes

Online Privacy

Steps for Safe Computing and Online Privacy

Top 10 tips for safe computing and online privacy Protect your personal information. Be aware of schemes that ask for personal or financial information. Do not respond to unsolicited requests for confidential information. Choose effective passwords. Choose passwords that are difficult to guess…


0 Comments3 Minutes

How To Create Secure Passwords

How To Create Secure Passwords You Won’t Forget

How To Create Secure Passwords Safety deposit boxes for our valuables, security systems for our homes, kryptonite locks for our bikes, and yet the top two computer passwords people use in 2015 are “123456” and “password”.  Does this sound counterintuitive?  As an IT support and services company,…


0 Comments5 Minutes

Cybersecurity Tips

Cybersecurity Tips to Keep Your Data Safe While Traveling

Cybersecurity Tips Cybersecurity Tips during your travels, it is easy to become so preoccupied with sharing your travel stories online that you forget to protect yourself against cyber threats. When it comes to cybersecurity, most people associate it with safe cyber practices at home, but…


0 Comments4 Minutes

Application security

Tips to lift your application security game

Application security What with ingenious data thieves and sloppy users, penetration testing is a good, and maybe essential, way to find vulnerabilities before the bad guys do. Even if a technology such as firewalls and intrusion detection systems protect 95 percent of an organization, “a…


0 Comments10 Minutes