Canadians have ‘naive belief’ hackers won’t target them: Trustwave

Small businesses worried about their IT need to find better ways to guard their data – especially as they present easy, unsecured targets, with hackers levelling their sights at them. Contrary to what

Published on: October 8th, 2013 Candice So

Fortinet launches newest high-throughput firewall appliance

Network security appliance maker Fortinet Inc. has built a new network firewall appliance for enterprise data centres, large service providers, cloud providers, and carriers. The California-based company announced it was releasing the FortiGate-3700

Published on: October 7th, 2013 Candice So

Try out these 7 free security tools for Linux

One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives. That's due in large part to the way Linux

Published on: April 13th, 2011 Katherine Noyes

Winning digital liberty in the workplace

Privacy may be dead, but that doesn't mean you have to enjoy having your every electronic move tracked by your nosy manager. If you use a company-supplied PC on a corporate network, and

Published on: March 24th, 2011 Robert Strohmeyer

Strike a fair balance when monitoring employee PCs

 Do you know what your employees are doing on the Web? At a minimum, they're probably goofing off watching YouTube videos. At worst, they could be steering your company toward financial ruin. In

Published on: March 24th, 2011 Robert Strohmeyer

Incident response lessons from the Gawker Media breach

There were plenty of security lessons to be learned from the recent Gawker Media breach. One of the lessons that has been glossed over was the failure of Gawker to have a plan

Published on: January 7th, 2011 George V. Hulme

What SMBs can learn from WikiLeaks’ resilient network

The recent cyber attacks on WikiLeaks and the site's resiliency are a case study in Web survivability that many businesses would do well to take note of, according to Canadian security experts. In

Published on: December 10th, 2010 Nestor Arellano

2011 security predictions: Web attacks, social engineering and mobile nightmare

Aside from the festivities of the holidays, one thing that always makes December special is the combination of reflecting on the year gone by, and looking ahead to what the next year might

Published on: December 6th, 2010 Tony Bradley

Money-stealing mobile Zeus botnet on the loose, McAfee reports

McAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is valuable for IT admins--enabling them to keep a finger

Published on: November 18th, 2010 Tony Bradley

Firesheep protection for Facebook, Twitter users

Security experts today suggested ways Firefox users can protect themselves against Firesheep, the new browser add-on that lets amateurs hijack users' access to Facebook, Twitter and other popular services.Firesheep adds a sidebar to

Published on: October 28th, 2010 Gregg Keizer

A dozen simple steps to secure your PC

The late-summer sales are great news if you're a PC vendor: it's one of the busiest trading periods outside of Christmas. Back-to-school purchasing is big business, and technology is one of its greatest

Published on: October 1st, 2010 Rosemary Hattersley

How to Out-Secure the Competition in 5 Easy Steps

Every year, we encounter a wide variety of companies, firms of different sizes that play distinct roles in their respective industries. Some are in a position to mitigate all sorts of risks to

Published on: July 26th, 2010 Claudiu Popa

How to create a great home-office network

Home networking is never as simple as merely connecting device A to device B. This guide will walk you through the jargon of setting up a home network. I'm focusing on PC networking

Published on: May 13th, 2010 Loyd Case

UTMs unmasked – can they really protect against security threats?

In the beginning was the firewall, and it was pretty good. A big box of rules that sat between your network and the evils of the Internet, the firewall examined ports and protocols

Published on: May 29th, 2009 Brian Chee and Curtis Franklin Jr.