Blog

Cybersecurity specialist at work

Everything we know about the MGM Cyberattack

The cyberattack on MGM is not only the hack of the year, but possibly the most significant breach of the decade. The impact on MGM's computer systems is expected to be long-lasting, with disruptions estimated to persist for weeks.

Cyber defence sensor hardware

Cyber Defence Sensors

Public corporations are currently deploying cyber defence sensors. However, corporations of all sizes are embracing them as they gain popularity.

Spyware design

Commercial Spyware Technology

Protect your business now to avoid legal consequences of the use of commercial spyware technology.

Employees working in open area

Preventing internal cybersecurity threats

There has never been a more important time to prevent internal threats. You can keep your digital assets secure by partnering with us to develop a training program.

Computer with javascript code on screen

Endpoint Detection and Response (EDR) Security

Endpoint detection and response (EDR) security is becoming popular as a way to thwart ransomware attacks or other intrusions.

Ransomware attack on mac computer

Double Extortion Ransomware Attacks

In spite of the fact that ransomware has been around for decades, it continues to evolve. Contact us for a cybersecurity assessment at 403-266-5238.

DDoS attack or cyberattack in progress

What is a distributed denial-of-service (DDoS) attack?

Online visibility, sales, and security can be seriously affected by DDoS attacks. Call 403-266-5238 to get your website assessed today.

User of multiple devices for communication

Unified Communications as a Service (UCaaS)

To reduce costs and improve security, organizations of all sizes are switching to unified communications as a service.

Computer displaying code

Zero Trust: A Model for More Effective Security

Learn what zero trust is along with a history of the cybersecurity fundamental that has prevents billions of losses in digital assets.

cybersecurity analysis with glasses in front

How to Prepare your Business for Cyber Attacks Resulting from Russia Ukraine Crisis

After numerous warnings from regulators, is your team prepared for cyber attacks coming from the conflict?

One drive security assessment

Onedrive & Security Features Review

Leaving your valuable data in Onedrive exposes it to many vulnerabilities. We review one drive and analyze security features in this entry.