Security Insights
Expert tips, industry trends, and practical advice to keep your business secure.
Where Have You Been? Your Apps Know
You may know that some apps are able to track your general location, but do you know exactly how much information these devices are collecting and how detailed this information is?
Read Article →
Is Siri Safe?
Is it safe to use Apple's digital assistant Siri? Although this feature allows users to more easily interact with their smart devices, it also is privy to a host of personal and sensitive information. Learn more about the risks involved with using Siri and how you can keep yourself safe.
Read Article →
How Safe is Google?
Are big professional website like Google safe from cybersecurity breaches? Read more to find out how seemingly legitimate malvertising campaigns can run on professional websites.
Read Article →
How To Spot and Prevent Malicious Emails
We've all clicked on a suspicious link before. Sometimes the link is harmless, and other times it could be detrimental to our systems and accounts.
Read Article →
Are Your Smart Devices Spying on You?
Is your home security camera as safe as you think it is? These devices can be hacked and you could be watched in your own home and not even realize it. Read more to learn more about how secure your favourite smart devices are.
Read Article →
Tips and Tricks for Good Password Management
Strong and unique passwords can help keep your accounts secure and your data safe. Read more to learn about the best ways to create a secure password.
Read Article →
Receiving Calls From Numbers Similar to Yours?
If you’re receiving phone calls from unknown numbers that have similar digits to your own, or from the same area code, you may be a target of a ‘Neighbour Spoofing’ attack.
Read Article →
Log4j: The security vulnerability affecting every corner of the internet
A major cybersecurity vulnerability, known as the Log4j vulnerability, is impacting nearly all of the internet, sending everything from financial institutions to government entities scrambling to patch their systems, before cybercriminals and nation states can launch cyberattacks.
Read Article →
How Easily Can Your Emails be Compromised?
This written piece explores the ins and outs of email security, how easily it serves as a delivery vector for compromisation, and what we can do to prevent this from happening.
Read Article →
How a Vancouver crypto trader lost $500,000 in Bitcoin
This written piece dives into a case study concerning a crypto day-trader, how they lost 100,000 Bitcoin to a hacker, and how they secured their system after the fact.
Read Article →
The Bitcoin Scam Ravaging Instagram: Bitconning
Account security is always a concern when you put any kind of personal information out on the web. But a new generation of scammers is emerging, using a particularly devious combination of social engineering, cryptocurrency, and old-fashioned blackmail. The scam is becoming more common on Instagram, where popular account holders are targeted and forced to assist in swindling their followers with fake videos.
Read Article →
What is the OSI model
The Open Systems Interconnection model, or OSI for short, is a conceptual framework which describes the seven layers that computer systems use to communicate over a network. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
Read Article →