July 8, 2020
Image: Should TikTok be Banned?

India and the US Military has banned TikTok – Should You?

Should you ban your employees from using TikTok in the workplace? Data security and privacy […]
July 8, 2020
A hand motions to press a cell phone. A glowing lock icon floats above them

What is Endpoint Security? What is an Endpoint?

What is endpoint security, and why is it important for your company? This article will […]
June 30, 2020
A hand counts several $100 US bills

Cybersecurity for Small Businesses with a Limited Budget

Cybersecurity for small businesses doesn’t have to be expensive, but it is critical. According to […]
May 26, 2020
Image of a hacker wearing a hooded sweatshirt and a plain white mask. They are sitting in front of multiple computer monitors, typing on their keyboard.

What is VPNFilter Malware? Russian Spyware Infects Networks

Is your network part of the VPNFilter botnet that infected over 500,000 IoT devices and […]
May 21, 2020
Computer with HTML website code on the screen

Want to Make Your Website GDPR-Compliant?

The evolving data privacy landscape has become a serious concern for webmasters and businesses that […]
May 19, 2020
Content control software for business: why use a web filter?

Why You Need to Use a Web Filter In Your Workplace

Should you use a web filter in your company? With the internet, we can connect […]
April 20, 2020
Image: CurrentWare company logo. Title: How to Develop an Endpoint Monitoring and Management Policy. Next to the title is a series of illustrations featuring a computer, USB flash drives, emails, a cell phone, and other decorative elements

How to Develop An Endpoint Monitoring & Management Policy

FAQ: Endpoint Security and Data Loss Prevention Before we begin, we will clarify the key […]
April 13, 2020
A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Casting Light on Shadow IT

“Shadow IT” – also known as Stealth IT, Client IT, or Fake IT – is […]
April 6, 2020
Paper document that says "Internet Usage Policy"

5 Ways to Enforce Your Acceptable Use Policy (AUP)

Improper use of technology by users puts your organization at risk of cybersecurity threats and […]
March 19, 2020
Man sitting on his couch. He is using a laptop and is clearly thinking deeply.

5 Cybersecurity Considerations When Your Employees Work From Home

The widespread pandemic of COVID-19 caused by the virus SARS-CoV-2 (a novel coronavirus) has forced […]
February 25, 2020
Rogue USB Devices Harm Endpoint Security

Don’t Plug In That USB! – How Rogue USB Devices Harm Endpoint Security

Universal Serial Buses (USBs) are incredibly common connectors used in electronic devices such as flash […]
February 18, 2020
Ransomware Attacks in 2019

An Overview of Ransomware Attacks in 2019

Ransomware has cost companies an average of $84,116 per ransom in the last quarter of […]
January 20, 2020
Cybersecurity Risks of Remote Workers

5 Cybersecurity Risks of Remote Workers & How To Mitigate Them

The trend of employees working from home is continuing to rise, with an IWG study […]
January 14, 2020
LifeLabs Data Breach

15 Million Health Records Leaked – Is LifeLabs Doing Enough?

In October 2019, LifeLabs – Canada’s largest diagnostic test provider – disclosed that they fell […]
December 24, 2019
California Consumer Privacy Act

What is the California Consumer Privacy Act (CCPA)

Note: As of July 1st, 2020 the California Consumer Privacy Act (CCPA) is now being […]