Why Bill C-51 Increases the Importance of Secure File Sharing Software for Legal Professionals20150508090301
Why Bill C-51 Increases the Importance of Secure File Sharing Software for Legal Professionals
Does your law firm use an encryption program for electronic communication and document exchanges? The passing of Bill C-51 – known as the anti-terrori...
Don’t Compromise Between Security and Usability in Secure File Sharing Software20150503090008
Don’t Compromise Between Security and Usability in Secure File Sharing Software
When adopting new software, should security or usability be the deciding factor? Many enterprises have faced this internal struggle. IT departments va...
The Three Largest Data Breaches of 201420150408145243
The Three Largest Data Breaches of 2014
Did your organization suffer a data breach last year? Across all industries, information security needs to be a priority – but unfortunately, it often...
Delivering Services Online: Canada’s Cloud Computing Strategy20150311174446
Delivering Services Online: Canada’s Cloud Computing Strategy
We built TitanFile to limit risks for data-sensitive organizations. Now, Public Works and Government Services Canada aims to do the same. The combined...
Don’t Rely on SSL Encryption to Protect Your Organization’s Data20150220215716
Don’t Rely on SSL Encryption to Protect Your Organization’s Data
Does your organization use Secure Sockets Layer (SSL) 3.0 encryption for data protection? Doing so is a common practice among companies in many differ...
Insurers, what are YOUR risks?20130913115042
Insurers, what are YOUR risks?
Olga LioudvinevitchSeptember 13, 2013government regulation, HIPAA, in house solutions, insurance, PIPEDA, security0 comments
Insurers get clients through some of the toughest times of their lives, but are they fully aware of their own risks and liabilities? Most organization...
Onboarding a New Employee into your Secure Workplace20130815120926
Onboarding a New Employee into your Secure Workplace
Hiring new employees is an exciting time. Your company’s growing and you’ve got fresh faces generating new ideas in the workplace. But bringing on a n...
Who Should be Responsible for Employee Cybersecurity?20130729144217
Who Should be Responsible for Employee Cybersecurity?
Last week, the Guardian shared a blog post on how good cybersecurity starts at board level, not IT. The post explains that while the IT team and the C...
5 Signs you Need to Hire Expert Security Help20130722123058
5 Signs you Need to Hire Expert Security Help
Tony Abou-AssalehJuly 22, 2013cyber threat, cybersecurity, firewall, hacker, password, small medium business, SMB, trojan horse0 comments
If you’re the owner of a small-medium business (SMB), you understand the risks that online attacks could have on your organization. Hopefully you’ve t...