Blogs

FEATURE Hacker, security, privacy SHUTTERSTOCK

Preventing fraud in the call centre: Use voice biometrics, phone printing

Share on LinkedIn Share with Google+ Comment on this article 09/11/2014

The fraudster called the credit card company with a simple request; he was traveling out of the country and wanted fraud controls

So you think you can blog? Your last chance to prove yourself!

With less than two weeks until the contest closes, this is your last chance to try your hand at IT blogging and win one of four prizes. Our two previous suggested topics were

Published on: September 10th, 2014 Hibah Ahmed

A hype cycle for the cloud chasm

I’ve been thinking about adoption rates and use cases for cloud computing, particularly here in Canada.  My goal is to find signs that Canada is moving down the path towards “cloudiness” just as

Published on: September 3rd, 2014 Don Sheppard

Dealing with IT setbacks

After working through some challenging management problems, a staffer came to me and reported a setback to which I uttered “Rats, Bats and Alley Cats”. The stupefied employee retorted – “Say what?”  I

Published on: September 2nd, 2014 Ken Metcalfe

How much is too much IT security?

Usually security implementers are aware of all the red tape they create, and evaluate the trade-offs against the value of what they are guarding. Usability and efficiency are certainly important, but it is

Published on: August 27th, 2014 Donna Lindskog

New topic for: So you think you can blog?

Good morning fellow blogging enthusiasts! As promised, we have a new suggested topic for our blogging contest. Remember that you can still contribute blog posts about our previous topic, IT security, but if

Published on: August 27th, 2014 Hibah Ahmed

The demise of excess access: A eulogy for traditional VPN

Once upon a time, in a world where mobile meant "laptop" or "remote home PC", Corporate network connectivity came in two flavours: dial-up modem, with it's clunky protocols and achingly slow speeds, and

Published on: August 26th, 2014 Michael Ball

Women in IT lead with grace, assertiveness, courage and swagger

I was really excited to attend the Women in the IT Channel Recognition Luncheon last Thursday as a guest of Roberta Fox of the Fox Group. I wasn't sure what to expect. Growing up

Published on: August 26th, 2014 Chris Henry

How BES 10 works for me

There is still so much coverage these days about BlackBerry on a comeback trail, ready to take on the Apple iPhone and Android devices. There’s little doubt in my mind that BlackBerry will

Published on: August 25th, 2014 Chris Lau

Two projects to improve IT security without using software

Imagine if an invisible thief could break into your home and start stealing your possessions. That’s one of the threats posed by inadequate IT security. The pain and loss of poor IT security

Published on: August 14th, 2014 Bruce Harpham