July 8, 2020
Image: Should TikTok be Banned?

India and the US Military has banned TikTok – Should You?

Should you ban your employees from using TikTok in the workplace? Data security and privacy […]
June 30, 2020
A hand counts several $100 US bills

Cybersecurity for Small Businesses with a Limited Budget

Cybersecurity for small businesses doesn’t have to be expensive, but it is critical. According to […]
May 26, 2020
Image of a hacker wearing a hooded sweatshirt and a plain white mask. They are sitting in front of multiple computer monitors, typing on their keyboard.

What is VPNFilter Malware? Russian Spyware Infects Networks

Is your network part of the VPNFilter botnet that infected over 500,000 IoT devices and […]
May 19, 2020
Content control software for business: why use a web filter?

Why You Need to Use a Web Filter In Your Workplace

Should you use a web filter in your company? With the internet, we can connect […]
April 20, 2020
Image: CurrentWare company logo. Title: How to Develop an Endpoint Monitoring and Management Policy. Next to the title is a series of illustrations featuring a computer, USB flash drives, emails, a cell phone, and other decorative elements

How to Develop An Endpoint Monitoring & Management Policy

FAQ: Endpoint Security and Data Loss Prevention Before we begin, we will clarify the key […]
April 13, 2020
A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Casting Light on Shadow IT

“Shadow IT” – also known as Stealth IT, Client IT, or Fake IT – is […]
April 8, 2020
Image: Three people having a video conference together. Two are together in the same room, the other is a smiling man seen on a laptop screen.

Zoom’s Privacy Issues Explained

In the wake of the COVID-19 pandemic, Zoom Video Communications experienced a significant explosion in […]
April 6, 2020
Paper document that says "Internet Usage Policy"

5 Ways to Enforce Your Acceptable Use Policy (AUP)

Improper use of technology by users puts your organization at risk of cybersecurity threats and […]
March 23, 2020
A hand presses an icon of a cloud. The cloud disperses into other icons: A computer, a cell phone, a tablet, a laptop, and an MP3 player

35+ Apps to Help Your Employees Work from Home Successfully

If you’re new to managing employees that are working from home, you may not be […]
March 19, 2020
Man sitting on his couch. He is using a laptop and is clearly thinking deeply.

5 Cybersecurity Considerations When Your Employees Work From Home

The widespread pandemic of COVID-19 caused by the virus SARS-CoV-2 (a novel coronavirus) has forced […]
February 18, 2020
Ransomware Attacks in 2019

An Overview of Ransomware Attacks in 2019

Ransomware has cost companies an average of $84,116 per ransom in the last quarter of […]
January 20, 2020
Cybersecurity Risks of Remote Workers

5 Cybersecurity Risks of Remote Workers & How To Mitigate Them

The trend of employees working from home is continuing to rise, with an IWG study […]
January 14, 2020
LifeLabs Data Breach

15 Million Health Records Leaked – Is LifeLabs Doing Enough?

In October 2019, LifeLabs – Canada’s largest diagnostic test provider – disclosed that they fell […]
December 24, 2019
California Consumer Privacy Act

What is the California Consumer Privacy Act (CCPA)

Note: As of July 1st, 2020 the California Consumer Privacy Act (CCPA) is now being […]
December 20, 2019
Children's Internet Protection Act (CIPA)

Internet Filtering & Monitoring For CIPA Compliance

What is the Children’s Internet Protection Act (CIPA) The Children’s Internet Protection Act (CIPA) is […]