Snowden, Security & Privacy
In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]
In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]
Most of us are aware that Canadian, USA and other governments are under constant attack from other sovereign nations, usually for the purposes of obtaining military or economic information. Many [...]
You’ve decided you need to set up an Information Security group in your IT department, or perhaps you already have one but it is not performing to your expectations. One [...]
Information Security in some organizations is considered to be a roadblock to doing business. In some cases, unfortunately, this has been true, and it’s because the business do not view [...]
You’ve analyzed the risks and decided to implement an Information Security Awareness Program for your employees. What should you include in such a program? The following provides some examples of [...]
Your employees could be the greatest danger when it comes to IT security and protecting your organization’s information. You have ensured that some of the best technology available has been [...]
As IT Leaders, we must be able to understand the risks we face, and how to address them. Understanding and managing your IT risks by categorizing them and then rating [...]
For a number of years now, IT has been confronted with what is known as the consumerization of IT. We used to have complete control: “you can’t have that”; “you [...]
Balancing IT Activities In IT, we all know that a certain amount of resources must be assigned for upgrades, updates, patches and scheduled maintenance. In general, this is known as [...]