Think multi-factor authentication can’t be hacked? Think again

Multi-factor authentication (MFA) is a good way to protect online accounts, but that doesn’t mean users should let their guard...

March 27th, 2020 Cindy Baker

Some Ontario beer chain outlets forced to use cash-only after cyber attack

Some of Ontario's 450 industry-owned retail beer outlets known as The Beer Store have been forced to accept only cash...

March 26th, 2020 Howard Solomon

The four-step guide to a summer security tune-up for your organization

Like Santa, cybercriminals know when you’ve been sleeping. And according to the latest statistics, they’ve been busier than ever this...

July 27th, 2018 Cindy Baker

Hashtag Trending - podcast banner

Hashtag Trending – Spotify goes public, BMO to open tech campus, Equifax breach hits millions more customers

Spotify goes public, the Bank of Montreal will open a tech campus in Toronto’s Eaton Centre, and Equifax reveals millions...

March 2nd, 2018 Mandy Kovacs

Is your security as mobile as today’s hackers?

How many times today did you access sensitive and personal information on your mobile device? Did you check your work...

Sponsored By: Fortinet

When the cyber criminals come calling, how fast can you shut the door?

A strong security strategy has never been more important, but it should also include effective post-breach tools to limit potential...

Sponsored By: Microsoft

Security breach updates: Yahoo triples original number of accounts affected in 2013 leak, Equifax revises downward

We seem to hear about new security breaches every week, but there have been two significant updates to previously announced...

October 4th, 2017 Mandy Kovacs

Cyber security

We’re not in a global cyber war but it’s a jungle out there: Israeli army cyber expert

TEL AVIV, Israel – Hardly a week goes by without a cyber attack being firmly – or mostly -- attributed...

February 13th, 2017 Howard Solomon

A Guide to Print Security for Canadian Organizations

A Guide to Print Security for Canadian Organizations

Security breaches don’t only occur in mobile devices and computers, but can find their way into other endpoint devices -...

November 5th, 2016 IT World Canada Team