Interac Corp. reveals new insights into consumer behaviour and online activity

As we commence Cybersecurity month, Interac Corp. is revealing new insights into consumer behaviour and online activity, in particular when it comes to consumer...

Trick or Treat Windows XP

Watch out for the zombies this Halloween! Windows XP systems, like zombies, are hard to kill. In many medium-sized companies, computers with the outdated...

Industry Experts Enhance CyberSense Software to Stay Ahead of Advancing Ransomware

Data integrity experts Index Engines announced the latest enhancements to its ransomware detection and recovery software, CyberSense, to help organizations win the war against...

Online Threats Retain Sky-High Levels as Pandemic-induced Cyberattacks Persist

According to Heficed (a network infrastructure solutions provider) the COVID-19 pandemic has touched virtually every aspect of human life—from health to housing to economy...

Hacked Out of Business — Why the Industry Should Focus More on SMB Security

Small and medium businesses (SMBs) comprise over 99 percent of U.S. firms, which might explain why they often find themselves in hackers’ crosshairs. However,...

How to Prepare and Protect your Digital Legacy

As we know in today’s world, the Internet and digital applications is woven into every day life. From our personal lives to our careers, our...

Hackers target Canadians seeking COVID-19 tracing

As Prime Minister Justin Trudeau was announcing a new app to help notify Canadians who may have been exposed to the COVID-19 virus, hackers were...

Kaspersky announces a new product: Integrated Endpoint Security

With the latest update to its flagship solution for mid-size and enterprise businesses, Kaspersky unveils a new approach that integrates Kaspersky Endpoint Security for...

Kaspersky Hybrid Cloud Security protects software development tools

Kaspersky announced that the next generation of Kaspersky Hybrid Cloud Security now safeguards software development operations (DevOps) environments. The product has been enhanced to enable...

The battle for business buy-in: Three ways to justify your IT security spend

By Evgeniya Naumova Proving return on investment in IT security – an almost impossible task for IT professionals. Why? Because they’re often found trying to...