Online Privacy

15 Alarming Cyber Security Facts and Stats

Cyber Security Facts The cybersecurity industry is rapidly growing every day. Although more resources are being deployed to counter cyber attacks, the nature of the industry still has a long way to go before we can, as a whole, catch up with these threats. It’s important for us to define what…


0 Comments7 Minutes

Tips for Cybersecurity

Data Privacy vs. Data Security [definitions and comparisons]

When it comes to data privacy vs. data security, we can frequently hear or read those terms being used interchangeably. However, are these indeed synonyms, or do they denote slightly different concepts? We will briefly touch on both their similarities and differences in this post. We will also…


0 Comments7 Minutes

Data Privacy

Data Privacy: What You Need to Know and How to Get Started

Data privacy is a huge public concern of the digital age, in part because data breaches continue exposing the personal data of millions of people. Even a single breach can have serious impacts: Individuals can suffer identity theft or blackmail, while companies risk financial costs along with…


0 Comments10 Minutes

Tips for Cybersecurity

Tips for Cybersecurity in the Workplace

Tips for Cybersecurity Tips for Cybersecurity to cut corners where correct cybersecurity practices are concerned should be avoided at all costs. The implementation of information security in the workplace requires the active collaboration of employees who are fully aware of their…


0 Comments3 Minutes

Protect Your Personal Data

8 Smart Ways to Protect Your Personal Data

Protect Your Personal Data Protect Your Personal Data, because the data breach at credit reporting agency Equifax affected 143 million Americans, giving hackers access to Social Security numbers, addresses, and credit file data. Identity thieves can use this information to destroy your credit,…


0 Comments5 Minutes

Common Security Breaches

Common Security Breaches You Need to Be Aware Of

Common Security Breaches Common Security Breaches caused In 2016, search engine and email giant organization Yahoo had their system compromised by a data breach, resulting in stealing the information of about 500 million users. Yahoo isn’t the only victim of a security breach. Other examples…


0 Comments8 Minutes

types of Firewall Architecture

Types of Firewall Architecture

Types of Firewall Architecture In its most basic sense, a firewall exists to prevent unwanted access to your computer network. Firewalls isolate your computer from the network with a layer of code that inspects all incoming and outgoing traffic. Whether attacks come in the form of malware hidden in…


0 Comments4 Minutes

Canada Day Flag

10 Fun Facts About Canada Day

Canada Day! Canada Day long weekend is finally here. With the fireworks scheduled tonight, hamburgers on the grill, and cold drinks in the cooler, there is so much to love about our national holiday. Although most Canadians celebrate the national holiday in one way or another, many are not aware…


0 Comments2 Minutes

secure password

Secure Passwords |52% of users reuse their passwords

Secure Passwords Most Internet users these days still haven’t fully understood the importance of establishing effective mechanisms to create secure passwords. In order to understand how complex the risk is, researchers at Virginia Tech University and Dashlane analysts have carried out one of the…


0 Comments6 Minutes

White Hat Hacker

What are White Hat Hackers?

Contrary to popular belief, not all hackers are malicious. Hackers use their skills to help protect against attacks are called “white hat”, while hackers looking to take down networks steal data, or compromise systems are called “black hat.”  White hat hackers work to proactively find security…


0 Comments6 Minutes