Malware attacks: 3 ways to protect your business
There was a time when malware was released into the wild as a prank by hackers with nothing better to do. But these days, advanced malware attacks are big business — from...
Lessons from Cybersecurity Awareness month
October is Cyber Security Awareness Month. While it's important to take Internet Safety seriously every day of the year, this month serves an important reminder of the re...
Cybersecurity best practices for remote workforce
The remote workforce has been growing for years, but the number of remote workers has recently spiked as entire workforces suddenly became remote. This dramatic change ha...
Are phishing attacks targeting your business?
Phishing attacks are nothing new to the business user.
Emails promising the riches of Nigerian princes. Poorly worded messages asking you to click on a provided link. De...
Five simple ways to enhance your account security
Using technology to crack passwords is not a new concept. In fact, if you think back to how Alan Turing cracked Enigma during World War II, as shown in The Imitation Game...
How you can create value through compliance
by Dylan Williams
This article is not meant to convince you of the merits of RFID-blocking wallets and underground bunkers. We all read the security breach headlines, pr...
Hybrid work requires new approaches to eDiscovery
As workplace technology becomes more agile, integrated, and mobile, obtaining and ensuring the integrity of electronic data in eDiscovery gets more complicated. Data type...
How much are your paper records costing?
It’s not surprising that governments can often get used to dealing with paper records. Unfortunately, the costs resulting from following such a process usually become an ...