Microsoft releases emergency update to fix two serious Windows flaws

Microsoft on Tuesday released emergency security patches to plug a pair of…

THE FIVE TYPES OF FIREWALL ARCHITECTURE

In its most basic sense, a firewall exists to prevent unwanted access to your…

10 Fun Facts About Canada Day

The Canada Day long weekend is finally here. With the fireworks scheduled…

52% of users reuse their passwords

Most Internet users these days still haven’t fully understood the importance of…

What are White Hat Hackers?

Contrary to popular belief, not all hackers are malicious. Hackers use their…

Steps for Safe Computing and Online Privacy

Top 10 tips for safe computing and online privacy Protect your personal…

How to tell if an email is malicious or genuine

Safety deposit boxes for our valuables, security systems for our homes,…

How To Create Secure Passwords You Won’t Forget

Safety deposit boxes for our valuables, security systems for our homes,…

Cybersecurity Tips to Keep Your Data Safe While Traveling

During your travels, it is easy to become so preoccupied with sharing your…

12 Simple Things You Can Do to Be More Secure Online

If a major shopping or financial site suffers a data breach, there’s not…

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind

Are You A Sitting Duck? You, the CEO of a small business, are under attack.…

How to hire a white hat hacker: 8 tips to lift your application security game

What with ingenious data thieves and sloppy users, penetration testing is a…

Top 10 online scams: Watch out for these common red flags

Scams aren’t new; they’ve been around for centuries, even millennia. They are…

Best InfoSec and Cybersecurity Certifications of 2020

10 Hot Cybersecurity Certifications For IT Professionals To Pursue In 2020 IT…

6 Steps for Preventing and Cleaning Up Cyberattacks

Districts face an intimidating array of…

Corona Virus (COVID-19): Staying Strong, Staying Connected

Life is a series of peaks and valleys.…

Cybersecurity and Sharing Data Across The Enterprise

Data is born in silos but is most valuable when shared across multiple…

BYOD Becomes More Strictly Policed in 2020

Bring Your Own Device (BYOD) has been a significant source of cybersecurity…

Business Development Specialist

Welcome to the world of Cybersecurity Locations: Ottawa, Kitchener Looking for…

Implementing cybersecurity at the beginning – Not at the end!

Another cybersecurity trend for 2020 is the realization that organizations…

Zero-Trust Model Predicted to Continue to Evolve In 2020

‘Zero Trust’ refers to a cybersecurity defence model that refuses trust to any…

Increases in Supply Chain Attacks Predicted for 2020

The supply chain is one of the leading cybersecurity threats that CEOs, IT…

The Impact of Internet of Things on Cybersecurity

Consumers and businesses must be wary of their cybersecurity when it comes to…

Introducing Fully-Managed, High-Speed, Secure Hosting for Agencies

Whenever I talk to agency partners I ask them about the latest developments in…

How to Protect Your Business When Selling Online in 2020

You need to be wary of fraudulent purchases when you’re selling online – your…

Top 10 Cybersecurity Tips for the Holidays Season

The holiday season is fast approaching, and individuals and businesses alike…

Rhyno’s Message on CBC Radio’s Sounds of the Season about Cybersecurity Awareness for this Holiday Season

Dan Duran of Rhyno Cybersecurity, resplendent in a Super Mario Christmas…

Cybersecurity Attacks Can Happen Everywhere – Cybersecurity Expert Warns.

This is the message that our CTO, Dan Duran, is trying to get across after…

How to protect your personal info from hackers on your Mac – Cybersecurity Tips

As soon as you’re connected to the Internet, applications can potentially send…

What you need to know about Canada’s cybersecurity business landscape

Did you know that more than 54% of impacted businesses in Canada report that…

Don’t Get Spoofed! – A lesson on Password Spoofing

What is Password Spoofing? Password Spoofing also-known-as login spoofing is…

October is Cyber Security Awareness Month in Canada

October is Cyber Security Awareness Month in Canada…

Live Interactive Threat Map

Look at this and you will be amazed! A cyber attack map is just a fancy,…

How SELECT code_execution FROM * USING SQLite; can ruin your site.

https://twitter.com/rhyno_io/status/1176895638518272000

Cyber attack that cost Stratford city hall $75K ransom should be wake-up call: Expert

Cyber attack that cost Stratford city hall $75K ransom should be wake-up…

Web Developer

We have an exciting career opportunity for a WordPress Web Developer to join…

Project Analyst – Online & Mobile Software

We have an exciting career opportunity for a Project Analyst to join our team…

Account Manager

We have an exciting career opportunity for an Account Manager to join our team……