Data Security

Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

When Yahoo Inc. on Thursday admitted that a “state-sponsored” hacker was able to abscond with 500 million user accounts, it...

September 23rd, 2016 Ryan Patrick

A Guide to Print Security for Canadian Organizations

A Guide to Print Security for Canadian Organizations

Security breaches don’t only occur in mobile devices and computers, but can find their way into other endpoint devices -...

September 22nd, 2016 IT World Canada Team

BlackBerry Mobility in Financial Services: A Regulatory Compliance Checklist

BlackBerry Mobility in Financial Services: A Regulatory Compliance Checklist

They understand that mobilizing business processes can help improve customer satisfaction and response times; boost employee productivity; increase competitive advantage,...

September 22nd, 2016 IT World Canada Team

The Mobile Enterprise: Is Ease of Use Overriding Security?

The Mobile Enterprise: Is Ease of Use Overriding Security?

This guide reveals IDG research on lessons learned from enterprises that have mobilized at least one Microsoft application, pros and...

September 22nd, 2016 IT World Canada Team

black-code-feature-e1473871157920-620x250

‘Black Code’ film tells cautionary tale of digital transformation’s dark side 

Who will watch the watchers? Well, all of us. That’s the message to be decrypted – albeit easily enough –...

September 19th, 2016 Brian Jackson

Addressing Advanced Email Threats: Protect Your Data and Brand

Addressing Advanced Email Threats: Protect Your Data and Brand

Each day, more than 100 billion corporate email messages are exchanged. Security has naturally become a top priority, but mass...

September 18th, 2016 IT World Canada Team

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

Traditional defenses, including firewalls and endpoint antivirus, no longer work against these attacks. The process of handling malware must evolve...

September 18th, 2016 IT World Canada Team

Cisco 2016 Midyear Cybersecurity Report

Cisco 2016 Midyear Cybersecurity Report

Ransomware is dominating the malware market - and businesses are becoming the target of choice for cybercriminals. Organizations are creating...

September 18th, 2016 IT World Canada Team

cso-vid

The Top 4 Data Security Best Practices

Information is the lifeblood of today's digital businesses. And according to research firm IDC, Canadian firms are projected to spend...

September 16th, 2016 Ryan Patrick