Process Services Results Pricing About Contact

Security Insights

Expert tips, industry trends, and practical advice to keep your business secure.

Where Have You Been? Your Apps Know
Cybersecurity April 4, 2022

Where Have You Been? Your Apps Know

You may know that some apps are able to track your general location, but do you know exactly how much information these devices are collecting and how detailed this information is? ‍

Read Article →
Is Siri Safe?
Mobile Security April 4, 2022

Is Siri Safe?

Is it safe to use Apple's digital assistant Siri? Although this feature allows users to more easily interact with their smart devices, it also is privy to a host of personal and sensitive information. Learn more about the risks involved with using Siri and how you can keep yourself safe.

Read Article →
How Safe is Google?
Cybersecurity April 4, 2022

How Safe is Google?

Are big professional website like Google safe from cybersecurity breaches? Read more to find out how seemingly legitimate malvertising campaigns can run on professional websites.

Read Article →
How To Spot and Prevent Malicious Emails
Email Security April 2, 2022

How To Spot and Prevent Malicious Emails

We've all clicked on a suspicious link before. Sometimes the link is harmless, and other times it could be detrimental to our systems and accounts.

Read Article →
Are Your Smart Devices Spying on You?
Cybersecurity April 1, 2022

Are Your Smart Devices Spying on You?

Is your home security camera as safe as you think it is? These devices can be hacked and you could be watched in your own home and not even realize it. Read more to learn more about how secure your favourite smart devices are.

Read Article →
Tips and Tricks for Good Password Management
Security Best Practices March 30, 2022

Tips and Tricks for Good Password Management

Strong and unique passwords can help keep your accounts secure and your data safe. Read more to learn about the best ways to create a secure password.

Read Article →
Receiving Calls From Numbers Similar to Yours?
Cybersecurity March 25, 2022

Receiving Calls From Numbers Similar to Yours?

If you’re receiving phone calls from unknown numbers that have similar digits to your own, or from the same area code, you may be a target of a ‘Neighbour Spoofing’ attack.

Read Article →
Log4j: The security vulnerability affecting every corner of the internet
Cybersecurity December 22, 2021

Log4j: The security vulnerability affecting every corner of the internet

A major cybersecurity vulnerability, known as the Log4j vulnerability, is impacting nearly all of the internet, sending everything from financial institutions to government entities scrambling to patch their systems, before cybercriminals and nation states can launch cyberattacks.

Read Article →
How Easily Can Your Emails be Compromised?
Email Security December 10, 2021

How Easily Can Your Emails be Compromised?

This written piece explores the ins and outs of email security, how easily it serves as a delivery vector for compromisation, and what we can do to prevent this from happening.

Read Article →
How a Vancouver crypto trader lost $500,000 in Bitcoin
Cybersecurity December 8, 2021

How a Vancouver crypto trader lost $500,000 in Bitcoin

This written piece dives into a case study concerning a crypto day-trader, how they lost 100,000 Bitcoin to a hacker, and how they secured their system after the fact.

Read Article →
The Bitcoin Scam Ravaging Instagram: Bitconning
Social Media Security December 3, 2021

The Bitcoin Scam Ravaging Instagram: Bitconning

Account security is always a concern when you put any kind of personal information out on the web. But a new generation of scammers is emerging, using a particularly devious combination of social engineering, cryptocurrency, and old-fashioned blackmail. The scam is becoming more common on Instagram, where popular account holders are targeted and forced to assist in swindling their followers with fake videos.

Read Article →
What is the OSI model
Cybersecurity December 1, 2021

What is the OSI model

The Open Systems Interconnection model, or OSI for short, is a conceptual framework which describes the seven layers that computer systems use to communicate over a network. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

Read Article →