Microsoft has announced that they will be implementing a change that will, by default, enable LDAP channel binding and LDAP signing.
With the rapidly changing cybersecurity landscape, IT professionals need to implement some of their own changes to keep their data and users secure. Cybercriminals are becoming more bold and [...]
Recently, our team hosted a live webcast on Office 365 security. During the webcast, the discussion generated an extremely high number of questions from the audience, and we wanted to make sure [...]
Office 365 security is not something that should be taken lightly. However, with thousands of businesses turning towards the productivity and technology giant for online email, file sharing, [...]
As Cyber Security Month comes to a close, let’s examine some of the trends in the cybersecurity space in Canada. In early October, three hospitals in Ontario were hit with a Ryuk ransomware attack.
Being responsible for your workplace technology can be scary. Not only do you have to keep your team productive, but you also need to keep your data safe. In today’s workplace, mobility is [...]
As the incidence of cyberattacks rises, organizations need to be better prepared to mitigate such events. Cybercriminals are increasingly gaining access to tools like ransomware, making it easier [...]
SD-WAN is a software-defined (SD) networking approach to managing a wide area network (WAN). WAN is a telecommunications network that connects users over large distances; in this case, it refers [...]
By Scott Anderson, Manager of Compliance at IT Weapons Computer passwords first popped up almost 60 years ago, and in the decades that followed, they have constantly been compromised. While there [...]
Last year, in an effort to help with the ongoing struggle of increasing security awareness, we put together a collection of Security Statistics compiled from notable security sources from across [...]