Category

Blog

Webinar Replay: Is Your Data Secure?

On March 18th, many of you joined us for the first webinar in our 2021 series. Below is a recap of the main points we shared and a link if you would like to watch the webinar. Top Technology Concerns of Business…

Read More

IT Checklist – Eight Steps to Achieve Security

Cybercrime is an unsettlingly fluid and versatile practice. Some threats are incredibly sophisticated and exploit low-level mechanisms. Meltdown – a hardware vulnerability discovered in 2018 – exploits a CPU performance technique to read a computer’s entire physical memory. After Meltdown…

Read More

Seven Cybersecurity Trends for 2020

The world is a different place in 2020 than ever before. No one could have anticipated how the norms and routines of our personal and work lives would be challenged. With the coronavirus driving schools and businesses online, cybersecurity has…

Read More