Last 7 Days

Screen Shot 2015-01-22 at 12.06.19 PM.png

Cisco security researcher: CSOs should beware hacker/state-sponsored collusion

Canadian CSOs who are already struggling to fend off a multitude of IT security threats may soon face an even...

January 22nd, 2015 Shane Schick
technology warp

The single most important question CIOs need to answer

I have a theory. OK, I have many theories but today’s theory has to do with a medical mystery. I...

January 30th, 2015 kevin pashuk
INSIDE SLIDE Cloud keyboard

Avaya, VMware ‘big friends’ on hybrid cloud

CANCUN, MEX. – Avaya has added to its “Big Friends” vendor partnership strategy by adding VMware; announced at its Avaya...

January 30th, 2015 Paolo Del Nibletto
feature Let's talk TV CRTC

Bell, Videotron mobile TV decision: No Internet fast and slow lanes says CRTC

The Canadian Radio-television and Telecommunications Commission’s (CRTC) most recent application of its net neutrality rules was exhibited last week when...

January 30th, 2015 Nestor E. Arellano
Three reasons why executives find IT to be such an enigma

Jumpstart your Windows Server 2012 migration with these 10 steps

Microsoft estimates that as many as 10 million Windows Server 2003 deployments are still active even as the company’s July...

January 30th, 2015 Nestor E. Arellano
Dell Kace K1000 device management tool

IT admins can now manage Chromebooks with Dell Kace K1000  

Dell Inc., has released a new version of its Kace K1000 systems management appliance which allows IT admins to manage...

January 30th, 2015 Nestor E. Arellano
danger sign, IT risks, security, malware, hackers

Canadian banks targeted by new Zeus malware variant

American financial institutions have been the targets of a number of malware attacks in the past 12 months. Now hackers...

January 30th, 2015 Howard Solomon
security and privacy issues

Cisco’s Chief Security and Trust Officer: ‘all hands on deck’

“Cybersecurity in any organization, no matter what the purposes, needs everyone’s involvement.” – John N. Stewart, SVP and Chief Security...

January 30th, 2015 Brian Clendenin
electric power

Is dirty power cleaning you out?

Typically IT departments prepare their systems for situations such as power failures brought about by area-wide shutdowns caused by inclement...

January 29th, 2015 Nestor E. Arellano
Image from

Warning: Ghost bug in Linux servers

Linux server users are scrambling to plug a hole in the GNU C Library that a vendor says allows attackers...

January 29th, 2015 Howard Solomon

Boosting collaboration amidst budget reductions

A recent report from IDC predicts that Canadian businesses and government will cut $415 million from ICT spending this year,...

Sponsored By: Telus
Angry mobile user

Improving customer experiences, CIO-Style

Cable companies who change your first name to expletives on customer correspondence, banks who call you a slut in their...

January 29th, 2015 Danny Bradbury
leadership feature

CIO leadership fundamentals: Strategy comes first

In an attempt to provide more direct insights into the world of the CIO from a layman’s perspective, here is...

January 29th, 2015 Gary Davenport
Amazon WorkMail CIOs Canada

The surprisingly strong business case for CIOs to try Amazon WorkMail

At this point, I’m half-expecting Amazon to introduce its own word processor too. The world’s biggest online merchant -- and...

January 28th, 2015 Shane Schick

Getting your Windows server migration team up to speed

Is your organization preparing to migrate from Windows Server 2003 to Windows Server 2012 R2? If so, you should know...

January 28th, 2015 Nestor E. Arellano
IT problems, computer flaws, glitches

Top 3 workplace issues that keep CIOs up at night

There’s a lot of items on a chief information officer’s plate these days but the issues that prevent them from...

January 28th, 2015 Nestor E. Arellano
feature Blackphone

Blackphone flaw allows hackers to take control of handset

In a mobile market now replete with reports of celebrity phone hacks, data breaches and NSA surveillance, SGP Technologies touts...

January 28th, 2015 Nestor E. Arellano
Red Privacy Button Keyboard

80 per cent of Canadians will choose a business on its privacy reputation: Survey

Businesses and governments in doubt about customer attitudes are towards data privacy have a new measurement tool: According to a...

January 28th, 2015 Howard Solomon
HP logo

HP rolls out new business laptop line

NEW YORK -- Businesses are going mobile, and with its new line of designed-for-business mobile devices, Hewlett-Packard Co. is betting...

January 28th, 2015 Jeff Jedras
INSIDE Apple iphone 6  720wide

10 ways to improve iPhone security

Apple Inc. sold a record 74.5 million smart phones in its most recent quarter, the company said Tuesday, led largely by its...

January 28th, 2015 Howard Solomon
INSIDE SLIDE Cloud keyboard

Tech trends, oil price slump could boost cloud adoption: Experts

Technology expenditure cuts brought about by declining oil prices, coupled with a few tech trends highlighted in the recently conclude...

January 27th, 2015 Nestor E. Arellano
lock on blue background, IT security

Firmware flaw allows hack attack of D-Link routers, other devices

A recently published proof-of-concept exploit illustrates how a certain D-Link router model could be vulnerable to hackers intent in hijacking...

January 27th, 2015 Nestor E. Arellano
cloud security

Slideshow: 4 tech trends driving cloud adoption

Drones, sensors and even 4K televisions will push widespread adoption of cloud computing in 2015 and beyond...

January 27th, 2015 Nestor E. Arellano
IBM Building

Big Blue layoffs much smaller than reported: IBM

IBM dismissed reports that it will be laying off as many as 110,000 workers beginning this week but admitted it...

January 27th, 2015 Nestor E. Arellano
IT workers from Wizeline

Wizeline offers baby steps approach to software product management

CIOs face challenges in understanding how to provide the most value to end users, whether they are internal business departments,...

January 27th, 2015 Danny Bradbury
IT, labor, jobs

Weigh pros and cons carefully before leaving Windows 2003: Expert

Your organization may not have a business case for Windows Server 2003 migration. That’s right. While slim, there is a...

January 27th, 2015 Dave Yin

Five ways to counter insider threats

A lot of attention is being paid to hackers who have broken into high-profile companies in the past 12 months, but...

January 27th, 2015 Howard Solomon
business executive evolving over time

The CIO role is evolving, so get with the times

I was recently at a job interview at which I was asked by the CEO what I would do (as...

January 27th, 2015 Michael Gladstone
cloud computing and servers

4 critical Windows Server 2012 features

How to make the most of your Windows Server 2012 implementation...

January 26th, 2015 Nestor E. Arellano
microsoft windows

Microsoft Giving Away Windows 10

Falling a bit behind the curve, Microsoft is playing catch up in a good way. It is making Windows 10...

January 26th, 2015 Chris Lau
Man with umbrella at sea

The oil price drop won’t impact these IT spend items: IDC

Information Technology decision makers need to prepare for substantial information and communication technology (ICT) budget cuts due to the falling...

January 26th, 2015 Nestor E. Arellano
data security,privacy,security

Think before you patch, says expert

The second Tuesday of every month Microsoft issues a series of patches for its software. Organizations pay particular attention to...

January 26th, 2015 Howard Solomon

One Day at a Time – Reframing complexity and ingenuity to ‘business as usual’ – Infographic

In the summer of 2014, CA Technologies agreed to sponsor a research paper that would allow ITWC to focus on...

Sponsored By: CA Technologies
cloud computing, cloud nfrastructure, cloud services, IT

Case Study: VDI Space

Download this case study and learn for yourself how the right disaster recovery system can decrease downtime for your dental...

January 26th, 2015 IT World Canada Team
feature telecom technicians Huawei

Huawei in hiring spree for Kitchener-Waterloo office

Chinese telecom giant Huawei Technologies Co. Ltd., appears to be gearing up to establish operations right in BlackBerry’s backyard in Kitchener-Waterloo....

January 26th, 2015 Nestor E. Arellano
enterprise app delivery Canada

Making Disaster Recovery Easy

This ebook for IT administrators shows how creating solid documentation is fundamental to efficient, sound recovery.  If you’ve got a...

January 26th, 2015 IT World Canada Team
Data Center - Server Racks

Business Health, Patient Health. Five Prescriptions to Stop Healthcare Disasters

In this eBook, Business Health, Patient Health: Five Prescriptions to Stop Healthcare Disasters, four StorageCraft partners who specialize in the...

January 26th, 2015 IT World Canada Team
money, IT expenses, saving, calculator

A business case for leaving Windows Server 2003 behind

Chief financial officers and audit groups should be taking notice of an issue that would normally be the domain of...

January 26th, 2015 Brian Jackson
wearble IT

Wearables won’t wait – But will CIOs bite?

The demonstration of Microsoft’s HoloLens on Wednesday couldn’t have come at a worse time for Google Glass. Microsoft wowed audiences...

January 26th, 2015 Danny Bradbury

Selling Disaster Recovery as a Service

Download this StorageCraft Profit-Ability Guide, aimed specifically at MSPs and VARs who sell backup and disaster recovery products, and learn...

January 26th, 2015 IT World Canada Team