New Feature Alert: File Retention Now Available20180123212450
New Feature Alert: File Retention Now Available
File Retention creates new efficiencies and provides an optimal solution for compliance and security while delivering on its core value of simplistic ...
The 2017 Equifax Data Breach: What’s Happened So Far20170908205509
The 2017 Equifax Data Breach: What’s Happened So Far
On Thursday, September 7, Equifax, one of the biggest credit reporting agencies in Canada and the United States, announced in a press release a securi...
Phishing: 5 Skills We Need to Combat It in the Modern Age20170829220826
Phishing: 5 Skills We Need to Combat It in the Modern Age
A few weeks ago, our Director of Business Development received an email from our President and COO. The sender asked if he was going to be in office. ...
DLA Piper Ransomware Hack: What Can We Learn From It?20170726155647
DLA Piper Ransomware Hack: What Can We Learn From It?
The Incident On June 27, DLA Piper LLP, one of the largest law firms in the world, was hit by a ransomware attack that infected hundreds of thousands ...
5 Lessons Organizations Can Learn From Walmart Canada’s Data Breach20170626184328
5 Lessons Organizations Can Learn From Walmart Canada’s Data Breach
Sammi PunJune 26, 2017cyber security, cybersecurity, data leak, data loss, encryption, online privacy, online security, security, security breach, security policy0 comments
The Data Breach Word of the data breach first broke out in July of 2015, when third-party photo processing vendor, PNI Digital Media, announced a data...
5 Secure File Sharing Features Your Solution Must Have20170615192508
5 Secure File Sharing Features Your Solution Must Have
Sammi PunJune 15, 2017collaboration, cyber security, cybersecurity, data leak, data loss, encryption, file sharing, online collaboration, online security, secure file sharing, security, security breach0 comments
Collaboration within a business is absolutely vital to the workflow of an organization. File sharing and information exchange is a core component of t...
How to Build a Cyber Security Culture at Your Firm20170524213435
How to Build a Cyber Security Culture at Your Firm
Sammi PunMay 24, 2017bring your own device, BYOD, cloud computing, Cloud security, collaboration, cyber security, cybersecurity, data breaches, data leak, data loss, ebook, email, encryption, file sharing, information security, secure file sharing, security, security breach, small medium business, SMB0 comments
Implementing a working culture of cyber security is difficult. Compliance is complex and rolling out a complete system and nailing out all the details...
China Hacks U.S. Government Servers: How Government Files Can Stay Secure20150610164118
China Hacks U.S. Government Servers: How Government Files Can Stay Secure
Governments at all levels are looking to increase security measures after suspected Chinese hackers broke into the United States government’s human re...
Why Your BYOD Policy Must Include Secure File Sharing Software20150513153336
Why Your BYOD Policy Must Include Secure File Sharing Software
Does your organization have a Bring Your Own Device (BYOD) policy that prioritizes secure file sharing software? Many people use personal devices – su...