January 20, 2020
Cybersecurity Risks of Remote Workers

5 Cybersecurity Risks of Remote Workers & How To Mitigate Them

The trend of employees working from home is continuing to rise, with an IWG study […]
January 14, 2020
LifeLabs Data Breach

15 Million Health Records Leaked – Is LifeLabs Doing Enough?

In October 2019, LifeLabs – Canada’s largest diagnostic test provider – disclosed that they fell […]
December 24, 2019
California Consumer Privacy Act

What is the California Consumer Privacy Act (CCPA)

A new decade is upon us, and with it comes a continuation in the rapid […]
December 20, 2019
Children's Internet Protection Act (CIPA)

Internet Filtering & Monitoring For CIPA Compliance

What is the Children’s Internet Protection Act (CIPA) The Children’s Internet Protection Act (CIPA) is […]
December 12, 2019
HIPAA Compliant Logo

HIPAA Compliance: What is it & How do I become Compliant?

HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that was enacted in […]
December 9, 2019
Cell Phones Risking Cybersecurity

Are Cell Phones Risking Your Cybersecurity?

It’s Friday afternoon and in just a few short hours your employees will be making […]
November 5, 2019

How to Block USB drives with Group Policy

It is best practice for an organization to control USB/Endpoint devices being used within the […]
October 18, 2019

CurrentWare Infographic Featured on PC Mag!

Our infographic was featured in a PC Mag article on data breaches! To learn more […]
October 3, 2019

What is Data Loss Prevention (DLP)?

Data Loss Prevention or DLP is the practice and usage of tools, technologies, and processes […]
June 21, 2019

What is endpoint detection and response?

Businesses are using the Internet to collect customer data and collaborate on company projects. Cybercriminals […]
September 6, 2018
A hand holding up the recognizable anonymous mask.

3 High Profile Incidents That Highlight the Need for DLP Software

Data theft from inside a company is a growing challenge in the modern world. We […]
August 26, 2014
Black laptop computer with a bomb connected to it.

USB Devices – The Next Large Security Threat?

Blackshades, Heart Bleed, IE exploits, the list goes on. Large security breaches are becoming more […]
May 27, 2014

How to Avoid Phishing

Phishing attempts, two words I hear far too often. I used to think it was […]
May 22, 2014

BlackShades Malware – What is it and Should I be Worried?

Well here we go again, a new threat to personal privacy and another way for […]
September 30, 2013

Is Your Practice Ready For HIPAA Compliance?

As of Sept 23, 2013, organizations handling healthcare data, will be required to be compliant […]