blog

Stories to write home about

RCMP Specialization in Cyber Security

The number of cybercrime is increasing across the globe, and Canada is not an exception. In 2013, RCMP had around 4,400 reported incidents, compared to 1,300 reported incidents in 2011. The number is increasing fast, and that prompted the PCC to plan for some new courses to cut down the cybercrime frequency and enable federal… Read More

Air Force Has a New Cyber Security Defence Plan

Cyber Security Lessons from the U.S. Air Force Of all the branches in the United States armed services, the Air Force is known to always be at the forefront of information technology, particularly in terms of cybersecurity. Over the next few years, the Air Force will augment its cyber defence systems with advanced cloud protection,… Read More

Health Care’s huge Cyber Security Problem

Cyber attacks in the healthcare industry are becoming widespread as seen with diagnostic tools being infected by malware that forces the user to pay a ransom before shutting down the monitoring system. These viruses were sent to hospitals which could disrupt patient care by hijacking drug administration, stealing data about patients, or even shut down… Read More

Government of Canada issues cyber security guide for Small-Medium sized Businesses

Many small and mid-sized businesses are concerned about encountering cyber security breaches because they don’t have the budget to hire infosec professionals to monitor their infrastructure. As a solution, the Canadian government issued a guide on baseline Cyber Security controls for SMBs. One example would be to automate software updates in a single patch. While… Read More

How to Begin a Career in Cybersecurity

Cyber security is in hot demand right now, with data breaches more common than ever before. It is an evolution of information security since this project involves the protection of data, regardless if it’s sensitive data pertaining to people, projects or financial information. According to the latest estimation from securitymagazine.com, 80 percent of IT businesses… Read More

5 Top Cybersecurity Threats We’ll Face in 2019

Last year saw an estimated 1,244 US data breaches with over 400 million records exposed. Are industries better prepared this year to defend against attack? An essential part of strong security is knowing the year’s top cybersecurity threats. This includes familiar threats like ransomware and unfamiliar threat trends too. Digital trends like Internet of Things will see… Read More

How The Internet of Things is affecting Cyber Security

The Internet Needs to be Secured Right Away Always The concept of security is a simple thing. Security makes things safe to use and live within everyday situations. The more complex the system, the more it requires sophisticated security in play to ensure things operate according to plan. Nowhere does this truth apply better than… Read More

Can You Handle a Cyber Security Career?

Increasingly, companies are making products accessed over the Internet, and it makes those products vulnerable to malicious attacks. Today, cybersecurity extends beyond keeping locally networked computers safe. It means keeping worldwide networks safe. The need for well-trained cybersecurity professionals has grown and will continue to increase as smart technology increases the use of the Internet…. Read More

Target’s Security Breach: How Hackers Got Millions of Credit Card Numbers

If you received a phone call from Target’s customer service department about your credit card, you were probably one of the 40 million people whose information was stolen in a recent hack. Target and its customers fell victim to a common hack called RAM scraping. While RAM scraping isn’t new, the Target security breach shows… Read More

Why Log Management is vital for your IT Security

Did you know that 43 percent of hacker attacks target small businesses? Every business no matter the size needs to protect its data from security breaches. Although companies want to protect data from threats, they don’t always know where to start. Log management can take care of this problem by identifying the areas of vulnerability… Read More