fbpx

News

Untameable

The blog that tells it like it is.
We created this blog for all IT folks, crazy innovators, free thinkers, and anyone else who is passionate about technology. This is our safe place to express our wildest tech thoughts, far-fetched ideas, and other revolutionizing content.

Why become a cyber defender?

Why become a cyber defender?

Whether for a bank, a telecommunications company, or a large aeronautics manufacturer, most projects I have contributed to were related to cyber security. This inherently involved a thorough understanding of the concepts and technologies.

read more
Identity Theft : Specific cases of cybercrimes

Identity Theft : Specific cases of cybercrimes

Did you know that identity theft is now the most common form of digital attack in Canada? In fact, according to a report by the Canadian Anti-Fraud Center (CAFC), nearly 30,000 citizens were victims of identity theft in 2022 alone. Of the reported cases, one-third are here in Quebec. Indeed, our ‘beautiful province’ is the one most affected by digital identity theft.

read more
Identity theft

Identity theft

Being the target of a cyberattack is never good news. Even less so is being the victim of identity theft. As a matter of fact, identity theft is a long-standing crime, but it has certainly grown and expanded since the digital shift in recent years. Today, this breach has become a major and dangerous issue regarding cybersecurity.

read more
Part 2- War in Ukraine : The Operation

Part 2- War in Ukraine : The Operation

Can you imagine the repercussions if our provincial or federal government was infiltrated by Russian cyber criminals? The public safety of Canadians would be in horrendous shape. But before thinking of the worst, it is crucial to understand the operation of a Russian cyberattack to prevent them and thus better thwart them.

read more
Teens and cybersecurity: Truths & Consequences

Teens and cybersecurity: Truths & Consequences

Whether it is music, applications, online purchases, or video games, nowadays everything goes through downloading. It is unfortunately one of the most used tactics by cybercriminals to infiltrate your children’s data and therefore yours too.

read more
No Holiday for Cybersecurity!

No Holiday for Cybersecurity!

If for some, the word holiday rhymes with freedom, for others it is synonymous with opportunity. Indeed, for cybercriminals, it is a golden opportunity to infiltrate your systems and thus hack your data through a cyber attack. After all, cybercriminals do not go on holiday!

read more
Why should companies adapt to a new management model?

Why should companies adapt to a new management model?

In fact, over the past few years, we have seen a gradual change in the way citizens work, on a large scale. Thanks to the technological advances of the last ten years, more and more workers have preferred to work remotely or simply on their own.

read more
The Blueprint for Modern IT

The Blueprint for Modern IT

It is no secret that a growing number of companies are facing the need to modernize their IT. Technologies are evolving, cybersecurity challenges are becoming a concern and some IT environments are becoming obsolete.
However, modernization is not just about putting together a list of services to update. Your business must evolve, needs change and your technological environment must adapt

read more
Buying a Server in 2021: A Crime Against Your Wallet

Buying a Server in 2021: A Crime Against Your Wallet

face it: more than half of the servers sold don’t go to corporate data centers. They go to those of cloud providers. What’s more, these companies (Microsoft and Google in particular) have put considerable effort into reducing their environmental footprint and becoming carbon neutral.

read more
10 Mind shifts needed for a great transformation

10 Mind shifts needed for a great transformation

For too many years now, you have suffered budget cuts. Tired of looking your IT infrastructure grows stale. You understand the need for transformation, for modernizing. You are also aware that your current mindset must evolve for the environment to do so.

read more
How to Find Digital Transformation Success From Repetitive Tasks

How to Find Digital Transformation Success From Repetitive Tasks

The leaders of a software development company wanted to proceed with a digital transformation by moving all of their services to the cloud. They took all the services they had deployed on their internal servers and moved them to a similar cloud configuration. They used a typical “lift and shift” approach.

read more
A recipe for results oriented cyber security

A recipe for results oriented cyber security

Cyber Security is complicated and can be prohibitively expensive. A dozen years ago, Cyber was a footnote on most corporate ledgers, but today it is a significant corporate cost, and often a topic of discussion at executive board meetings. Many corporate strategies...

read more