Being compliant doesn’t mean being secure: study

Despite growing pressure on enterprises to comply with increasing government and industry security regulations, a majority of Canadian businesses believe falling into line doesn’t make an organization secure. “According to participants, complying with

Published on: March 11th, 2013 Nestor Arellano

What are the risks facing your business and your data?

A secret unit of the Chinese army is linked to global cyber espionage. A recent survey indicates that the majority of Web surfing young employees don’t follow online security policies. How are emerging

Published on: March 1st, 2013 Claudiu Popa

Ontario county saves on compliance costs with vendor swap

With a population of 70,000 residents you might be prone to think that the IT and compliance challenges of Middlesex County would be negligible compared to those of much larger municipalities. However, the

Published on: June 6th, 2012 Nestor Arellano

Move over Anonymous, make way for The Unknowns

The latest shadowy hacker group to strike is calling itself The Unknowns, and they're bragging they've hacked NASA Glenn Research Center, the U.S. Air Force, the European Space Agency and others, posting some

Published on: May 3rd, 2012 Ellen Messmer

Religious Web sites top ‘most dangerous’ list

Have you been warning employees to stay clear of adult sites because they're laden with malware?Symantec Corp. suggests you might want to serve equal warning about Web sites in the opposite site of

Published on: April 30th, 2012 Nestor Arellano

Botnets and future threats

By Paul Comessotti and Kellman Meghu (This blog is the continuation of Botnets – The hacker’s backdoor to your network) Looking at the evolution of the bot threat, the first bot, "GMBot", was

Published on: March 14th, 2012 IDG News Service

Public-facing sites, workstations critical security risk: IBM

Major security breaches in 2011 were perpetrated by hackers who broke into secured networks using entry points such as employee workstations and devices, data servers and public-facing Web site, according to a report

Published on: March 9th, 2012 ITBusiness Staff

Execs don’t recognize sensitive data when they see it: IT admins

Today's companies, clearly very good at collecting data, seem "less savvy when it comes to how to classify and manage it."That's the conclusion of a survey among 100 IT executives and others conducted

Published on: March 8th, 2012 Roy Harris

Does breach assessment trump victim notification?

Assessing data breaches is more useful to mitigating the effects of such incidents than notifying affected individuals, according to a survey published on the same day as the European Union proposed a 24-hour

Published on: January 26th, 2012 Lucian Constantin

IT security managers: stressed out but well-paid

IT managers are losing sleep over the threat of data loss and not a few think protecting their company’s network is more stressful than handling a divorce, according to a recent survey commissioned

Published on: November 29th, 2011 Nestor Arellano

Full electronic medical records still 20 years away

Don't hold your breath over Canadian doctors fully adopting an electronic medical record (EMR) system any time soon.Health information and technology experts say it will likely take another 20 years or more before

Published on: October 3rd, 2011 Nestor Arellano

Websense warns small firms of ‘trickle down’ Web attacks

If you think your business is “too small to fall” victim to hacker techniques such as those used against Google in January 2010, the PlayStation network breach or the recent cyber attack on

Published on: August 26th, 2011 Nestor Arellano

Is your IT support compromising your data?

Data breaches are more prevalent and more costly than ever. Smarter technologies seem to breed smarter hackers, making it difficult for IT to keep up. But sometimes IT unwittingly helps the bad guys

Published on: July 25th, 2011 Nathan McNeill

Time to empower, not blame security’s ‘weakest link’

By Nestor E. Arellano It’s getting to be tiring hearing that tech users are data security’s weakest link. Recently we reported on a study released by Symantec Corp. which outlined the key differences

Published on: July 7th, 2011 Nestor Arellano