S1E3 – Don’t Let Google Be Your HR Expert!
July 16, 2021
Do you find human resources confusing and complicated? All this change and new rules can feel overwhelming, making it difficult to know if you’ve covered all your bases or are making the right decisions. Our guest expert, Shawn Brown, from HRCovered answers many questions on HR.
0 Comments1 Minute
S1E2 – Promote Your Website like a Pro!
July 9, 2021
Programmatic advertising helps marketers leverage AI and big data to reach prospects. Not only can you identify high-intent consumers, but you can also present ads at the right time and place to maximize results. Our expert guest speaker, Keith Walthers from MadAds Interactive, shows us…
0 Comments1 Minute
S1E1 – Make Your Website Accessible!
July 2, 2021
To comply with the Accessibility for Ontarians with Disabilities Act (AODA), all web content must conform to most of the WCAG 2.1 A and AA success criteria. In this talk, Rafi Glantz, from AccessiBe, walks through the following subjects: What is WCAG 2.1 A and AA? What are the rules…
0 Comments1 Minute
Why penetration testing is so important
Videos & Podcasts,Security Audits & Penetration Testing
May 31, 2021
Cyber attacks are getting more and more complex, so you need all the help you can get. It’s no longer enough to put security tools in place and cross your fingers. Lax practices and human error can expose even the most sophisticated systems to breaches. Unless an attacker brags publicly about his…
0 Comments2 Minutes
MDR Solutions
May 28, 2021
MDR Solutions MDR is an outcome-focused Managed Detection and Response service that supplies the people, technology, and cyber intelligence required to hunt for threats across your organization and help shut them down before they cause damage and disruption. Extensive threat visibility Without…
0 Comments3 Minutes
Types of insider threats
May 26, 2021
Types of Insider Threats An insider threat is a security risk that originates within the targeted organization. This doesn’t mean that the actor must be a current employee or officer in the organization. They could be a consultant, former employee, business partner, or board member. Insiders have…
0 Comments2 Minutes
Password Theft | Have you been hacked?
May 19, 2021
Password Theft Today, passwords are our modern-day sentry, helping to keep our (technological) properties secure and cyber intruders out. A password should be comprised of a random string of at least eight letters, numbers, and symbols used to create a unique password. Passwords are used in…
0 Comments3 Minutes
Cybersecurity Myths | Threat Actors Use Sophisticated Tools
May 17, 2021
CYBERSECURITY MYTHS! Cyber threat actors are not equal in terms of capability and sophistication and have a range of resources, training, and support for their activities. Cyber threat actors may operate on their own or as part of a larger organization (i.e., a nation-state intelligence program or…
0 Comments3 Minutes
What is OpenVas? | Vulnerability Assessment
May 10, 2021
What is OpenVas? OpenVAS (Open Vulnerability Assessment System) is a software framework of several services and tools offering vulnerability scanning and vulnerability management, free software, and most components are licensed under the GNU General Public License (GPL). Plugins for Open VAS are…
0 Comments2 Minutes
Cybersecurity Investment: Why it is more than important
May 3, 2021
Cybersecurity is an Investment, just look at the Red Numbers you NEED to avoid. Cybersecurity Investment has increased. Ransomware researchers estimate that the average ransom demand increased by 33% since Q4 2019 to approximately $148,700 CAD in Q1 2020 due to the impact of targeted ransomware…
0 Comments3 Minutes