Tuesday, May 17, 2022


Zero Trust Security Assessment

Businesses of every size are more concerned about cybersecurity than ever before. New threats emerge daily. Remote workers, cloud architectures, and an explosion of smart devices introduce new vulnerabilities.

Cyber Security Today, May 2, 2022 – More on how the Conti ransomware gang works, individuals victimized by ransomware, news on wiperware and more

This episode reports on ransomware, wiperware, the latest attacks by APT29 and a warning to NAS users

This Week in Ransomware – Friday, April 29, 2022

Companies are looking to cybersecurity insurance to mitigate ransomware losses, but cyber insurance may not be a panacea. Insurers may refuse a claim if...

Cyber Security Today, Week in Review for Friday April 29, 2022

This episode features discussion on ransomware, the Lapsus$ extortion gang, third party cyber attacks and the top 15 vulnerabilities used by hackers

Telus launches personal security beacons disguised as jewellery

Telus has launched a line of personal safety beacons disguised as charms. The SmartWear Security charms, created in partnership with InvisaWear, allow the wearer to...

Canada, U.S. in group of 61 nations vowing to work for an open internet

Signatories promise to resist efforts to splinter the global Internet

Cyber Security Today, April 29, 2022 – Breast cancer website leaves data open, a warning on Microsoft Explorer and Facebook privacy controls questioned

This episode reports on a misconfigured Amazon data bucket, a warning on an old Microsoft Explorer bug being exploited and Facebook's privacy controls questioned

Four of the top 15 vulnerabilities used last year by hackers were more than a year old: Report

One unpatched vulnerability regularly exploited by hackers in Fortinet products dates back to 2018, says report from Five Eyes cyber intelligence agencies

Fewer insurers offering cyber coverage — and its harder to get — says Sophos ransomware report

Forty per cent of respondents said fewer companies are offering cyber insurance.

Cyber Security Today, April 27, 2022 – Lots of software still has log4j2 vulnerabilities, hackers took only days to exploit a VMware vulnerability and...

This episode reports on Log4Shell vulnerabilities, the speedy work of hackers, a website that catalogs one hacker's efforts to compromise the NPM library and a risky wireless brake light solution

Earth Day Special Coffee Briefing April 26, 2022 – Telus launches Buy One, Plant One campaign; Intel commits to net-zero greenhouse gas emissions; and...

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. This briefing is delivered by IT World Canada's editorial team!

Featured Security Download

Security Resource Kit

Security Training Resource Kit

Experts say that training can reduce security incidents by anywhere from 45% to 70%. "We asked ourselves why security training couldn't be fun as well as informative." IT World Canada and it's creative arm, Amazing! Agency have created some training materials which actually make security training engaging and interesting. Each unit starts with a fun video or interactive game and let's you get the interest of the group....

Security Videos

Security Blogs


30 valuable hidden iPhone features [Part 1]

Using these ten hidden iPhone features will make your iPhone experience more productive and valuable.

10 free cybersecurity awareness training courses you can take today

A list of 10 organizations that are offering free cybersecurity awareness training courses to help you understand and report security threats and breaches.

Has your iPhone been hacked?

We've listed 13 ways hackers can compromise iPhones and highlighted ways to protect yourself and your data.

Tour Trend Micro’s new cyber security research lab in Toronto

  Cyber threats are becoming increasingly sophisticated, targeting everything from your inbox to elections, and Canada sees its fair share of them. Between 2011 and...