Snowden, Security & Privacy

In June of 2013, Edward Snowden leaked classified information from the National Security Agency (NSA). The leaked information revealed a number of surveillance programs that had been initiated by the NSA, and other international intelligence agencies throughout the world. These programs were keeping tabs on US citizens as well as foreign officials and dignitaries. They [...]

MISA Security Conference A Big Success

Approximately 200 delegates attended the 2015 MISA (Municipal Information Systems Association) Annual Security Conference in beautiful Niagara-on-the-Lake last week. There was something for everyone – the techies had training sessions, there were humorous keynote speakers and very informative sessions on what governments are doing to keep us and our information safe. Day 1 (Monday) was [...]

By |October 7th, 2015|Technology|0 Comments

Analyzing the Ashley Madison Data Breach

Analyzing a Data Breach: Ashley Madison - the Good, the Bad, and of course the Ugly Recently, the Ashley Madison network was compromised, allegedly by a group known as the Impact Team. The hackers have asked the owners of this site and another site called ‘Established Men’, to take down both sites, or they will [...]

By |August 26th, 2015|Information Technology Security, Technology|0 Comments

Governments are also Targets for Hackers

Most of us are aware that Canadian, USA and other governments are under constant attack from other sovereign nations, usually for the purposes of obtaining military or economic information. Many of us also know that our own governments have similar programs in place. However, there are many others out there who also try to hack [...]

Information Security – Separate or Integrate?

You’ve decided you need to set up an Information Security group in your IT department, or perhaps you already have one but it is not performing to your expectations. One of the decisions you have to make is whether to integrate IT security within your current structure or to keep some of it separate from [...]

Information Security is really Risk Management. Change your Perspective

Information Security in some organizations is considered to be a roadblock to doing business. In some cases, unfortunately, this has been true, and it’s because the business do not view information security as risk management, and because IT do not present it as such. Most organizations have a risk management function, and business units deal [...]

Do You Have a Strong Information Security Awareness Program?

You’ve analyzed the risks and decided to implement an Information Security Awareness Program for your employees. What should you include in such a program? The following provides some examples of what you should be telling your staff about in any Information Security Awareness Program. Personal Information Security: Many employees do not believe information security in [...]

IT Security Alert!!! Are Your Employees Endangering You?

Your employees could be the greatest danger when it comes to IT security and protecting your organization’s information. You have ensured that some of the best technology available has been deployed to protect your organization: firewalls, anti-virus, web filtering and more, but what have you done to educate and empower your staff on information security [...]