#FollowFriday – 3 viewpoints on CASL

Every Follow Friday, we round up a list of people with active Twitter accounts, ones that we feel are worth a click on the 'follow' button. This week, we're focusing on people who

Published on: July 3rd, 2014 Candice So

Decoding CASL – Responding to easyDNS

We've been talking a lot about Canada's Anti-Spam Legislation (CASL) lately. This piece of legislation will affect how Canadian organizations send electronic messages to consumers, including email, voice, text, and sound missives -

Published on: October 2nd, 2013 Candice So

3 key things you should know about CASL

Canada's Anti-Spam Legislation (CASL) will be coming into force July 1, meaning businesses will have to watch what kinds of electronic messages they're allowed to send their customers. And here at IT Business.ca,

Published on: October 1st, 2013 Candice So

Two paths to prepare for CASL: Express and implied consent

With the enactment of Canada's Anti-Spam Legislation (CASL) around the corner, it's hard to know what kind of message your business is allowed to send to reach customers, and what kind of message

Published on: September 30th, 2013 Candice So

A marketer’s guide to being CASL ready

Bret Conkin is the chief marketing officer for FundRazr, Canada's biggest crowdfunding platform. He has prepared this list of tips for marketers, in advance of Canada's Anti-Spam Legislation (CASL). This post appeared as

Published on: September 23rd, 2013 Bret Conkin

Canada’s anti-spam law, all hype or something to watch out for?

We have all been the victims of “spam” at some point in our lives. It is almost daily that we receive some form of unsolicited e-mail message attempting to get us to buy

Published on: September 20th, 2013 Monica Goyal

How to prepare for Canada’s Anti-Spam Legislation

Canada's new Anti-Spam Legislation is coming. It will come into force July 1, and it will have a broad sweeping impact on all organizations that use e-mail marketing, mobile marketing, and other forms

Published on: September 16th, 2013 Robert Burko

Researchers show captcha on most popular sites easily broken

You know those annoying boxes of jumbled, multicolored, slanted, crossed-out, or reversed text that are practically indecipherable to prove to a Web site that you are human? They're called captchas.Captcha stands for 'Completely

Published on: November 2nd, 2011 Lucian Constantin and Kevin Lee

Money-stealing mobile Zeus botnet on the loose, McAfee reports

McAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is valuable for IT admins--enabling them to keep a finger

Published on: November 18th, 2010 Tony Bradley

Symantec’s Norton 2010 taps user pool for reputation-based security

Security vendor Symantec Corp. is capitalizing on the “crowd sourcing” trend by using its large user base to add a new reputation-based layer of security to its Norton 2010 line of products released

Published on: September 9th, 2009 Brian Jackson

Top 10 contenders for the title of ‘Spam King’

As more and more spammers are arrested, prosecuted, and sued under state and federal antispam statutes, there's one thing you can count on: Someone somewhere will invariably call the targeted spammer a "spam

Published on: October 15th, 2008 Dan Tynan

Hot tips on avoiding PC security pitfalls

Viruses, spyware, and worms. Oh, my! We all know the dangers inherent in accessing the Internet, and we all take precautions. Yet our PCs still occasionally get infected because we can't know everything.

Published on: April 24th, 2008 Lincoln Spector

Tech vendors confounded as spam steamrolls along

Tech vendors have made headway in the war on spam, yet spammers are returning volley with sheer numbers. Perhaps it's time for more drastic measures? These are the rumblings from InfoWorld Test Center

Published on: April 18th, 2008 Tom Kaneshige

Top 10 security threats to your business network

There are lots of ways business networks can be compromised, and more are developing all the time.They range from technology exploits to social engineering attacks, and all can compromise corporate data, reputation and

Published on: April 10th, 2008 Tim Greene