Weekly Round up: June 24 – 28

Posted by Tony Abou-Assaleh on June 28th, 2013

We’ve had our first week of summer, and unfortunately news of security breaches and data leaks don’t take summer holidays. Here are the latest stories: 8 ways to fight medical ID theft – Government Health IT Medical ID theft is expensive, and impacts over one million people annually. Senior citizens are especially vulnerable, and don’t […]

Learn More

How do you Protect your Online Privacy?

Posted by Tony Abou-Assaleh on June 27th, 2013

Recent news stories almost make the term ‘online privacy’ seem like an oxymoron. While it’s certainly disconcerting to recognize the amount of data leakage and mining taking place, don’t be discouraged. It’s not the time to throw in the towel when it comes to understanding and safeguarding your online privacy – it’s time to take […]

Learn More

Do your Employees Value Cybersecurity?

Posted by Tony Abou-Assaleh on June 25th, 2013

If you’re serious about protecting your organization from online attacks, you’ll want to ensure you have a workforce that is committed to recognizing and avoiding cyberthreats. Just like with your favourite sports team, you’re only as strong as your weakest member. If you have one employee who is performing illegal downloads or only loosely following […]

Learn More

Understanding the Security Risks Impacting SMBs

Posted by Tony Abou-Assaleh on June 24th, 2013

It seems as though every time we turn on the television, or open a web browser there’s a new story about the latest security breach. Quite often the stories highlight a large business, or even a branch of the government, that has fallen victim to a hack. If you’re the owner of a small-medium business […]

Learn More

Weekly Round up: June 17 – 21

Posted by Tony Abou-Assaleh on June 21st, 2013

ere are some of the top stories we found this week on the topic of security and privacy.  Most Data Breaches Caused by Human Error, System Glitches – CIO While outside threats still pose a large problem for organizations, internal breaches and errors are also likely culprits. That’s why it’s important to have security policies […]

Learn More