Zero Trust: A Model for More Effective Security

Forrester Research analyst John Kindervag came up with the zero trust network model in 2010 while a principal analyst at the firm. It is now twelve years later that corporate leaders worldwide are increasingly embracing zero trust as the technologies that facilitate it reaches the mainstream. The pressure to protect enterprise systems and data increases, …

How to Prepare your Business for Cyber Attacks Resulting from Russia Ukraine Crisis

A new era of cyberwarfare For many years, Russia has been known to harbour malicious actors who undertake endless cyber Attacks on North American digital property.  From industrial plants, medical facilities and education institutions, nothing of off limits for these highly skilled, rogue operators.  Even after instructions from Russian government to handover any cybercriminals these …

Onedrive Security Features & Review

Onedrive Security Features & Review Does Onedrive come with reliable security? All Onedrive users are extended both two factor authentication and also the ability to access Personal Vault which will further safeguard data with a variety of settings for added protection.  Encryption is offered to all users but it’s not considered impenetrable as data transfer …