32.8 C
Toronto
Sunday, July 6, 2025

Interac Corp. reveals new insights into consumer behaviour and online activity

As we commence Cybersecurity month, Interac Corp. is revealing new insights into consumer behaviour and online activity, in particular when it comes to consumer...

Trick or Treat Windows XP

Watch out for the zombies this Halloween! Windows XP systems, like zombies, are hard to kill. In many medium-sized companies, computers with the outdated...

Kaspersky integrates with SolarWinds to help MSPs deliver automated cybersecurity protection to their customers

Following integration with SolarWinds N-central earlier this year, Kaspersky has now integrated its cybersecurity solutions with the SolarWinds Remote Monitoring and Management platform to...

Kaseya: COVID-19 and the unknown threat to cybersecurity

Beginning this week, many companies asked their workforces to work remotely, including SMBs, a segment that saw a 424% increase in cyberattacks in 2018....

How secure is your phone’s lock screen?

ESET shares tips for keeping your personal device secure. As people become more sensitive about the privacy and security of their data, Canadians across the...

Sophos Introduces Lateral Movement Protection to XG Firewall

Sophos, a global leader in network and endpoint security, announced that its next-generation Sophos XG Firewall now includes lateral movement protection to prevent targeted,...

Kaspersky Hybrid Cloud Security protects software development tools

Kaspersky announced that the next generation of Kaspersky Hybrid Cloud Security now safeguards software development operations (DevOps) environments. The product has been enhanced to enable...

Communicate Safely Online with Hornetsecurity

Hornetsecurity ensures efficient and secure communications by email and on the Internet – without any hardware, software and maintenance.  The German-based company offers cloud-based...

30 Years of Elite Cyber Protection with ESET

Threats are only going to increase. To fit against bitcoins, phone phishing and even CDs with malware, a lot of products for endpoint are...

The battle for business buy-in: Three ways to justify your IT security spend

By Evgeniya Naumova Proving return on investment in IT security – an almost impossible task for IT professionals. Why? Because they’re often found trying to...