CyberSecurity Summit

We are very pleased with the turn-out last week for the Toronto North Cyber Security Summit.  Thank you to our partners and guests that were able to attend.   For those of you that are looking for a copy of the presentations, see below:   Security Secrets – Avecto Your Data Their Cloud – Gemalto…

Proactive or Reactive

When it comes to cybersecurity, are you proactive or reactive?  I think it is safe to say that most IT leaders strive to be proactive in managing their environment.  Many try to implement tools which monitor and alert when a device fails or hit a resource threshold.  But from a security perspective, too many organizations…

Social Media Security

What does social media mean to you? You may use it for personal reasons to interact and communicate with friends and family Businesses use to promote their brand and interact with customers Hackers view it as a new frontier for cyber-attacks. They are using social media as a tool to perform reconnaissance and a platform to…

I forgot My Password…Again

Don’t worry, you’re not alone.  According to an Intel Security poll, “37% of people forget a password at least once a week”4.  There is no debating that the use of passwords is a necessity in both work and personal lives.  The premise is that credential-based authorization is used to provide appropriate access to systems/data and…

Application Frame Work Lunch and Learn

Please join us for an insightful session to better understand how Palo Alto Networks’ Application Framework is being used to integrate best-in-class security intelligence. Learn how you can gain immediate security value from apps developed by Palo Alto Networks®, an open ecosystem of trusted innovators, or your own team. Spend more time benefiting from these…