Snowden, Security & Privacy
In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]
In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the [...]
Approximately 200 delegates attended the 2015 MISA (Municipal Information Systems Association) Annual Security Conference in beautiful Niagara-on-the-Lake last week. There was something for everyone – the techies had training sessions, [...]
Analyzing a Data Breach: Ashley Madison - the Good, the Bad, and of course the Ugly Recently, the Ashley Madison network was compromised, allegedly by a group known as the [...]
Most of us are aware that Canadian, USA and other governments are under constant attack from other sovereign nations, usually for the purposes of obtaining military or economic information. Many [...]
You’ve decided you need to set up an Information Security group in your IT department, or perhaps you already have one but it is not performing to your expectations. One [...]
Information Security in some organizations is considered to be a roadblock to doing business. In some cases, unfortunately, this has been true, and it’s because the business do not view [...]
You’ve analyzed the risks and decided to implement an Information Security Awareness Program for your employees. What should you include in such a program? The following provides some examples of [...]
Your employees could be the greatest danger when it comes to IT security and protecting your organization’s information. You have ensured that some of the best technology available has been [...]
As IT Leaders, we must be able to understand the risks we face, and how to address them. Understanding and managing your IT risks by categorizing them and then rating [...]