The blog that tells it like it is.
We created this blog for all IT folks, crazy innovators, free thinkers, and anyone else who is passionate about technology. This is our safe place to express our wildest tech thoughts, far-fetched ideas, and other revolutionizing content.
Russia has a strong reputation for using cybercrime, in all its forms, to attack its adversaries. Maneuvers that do not cause death, of course, but which generate serious consequences for all those who are victims. Therefore, are we in Canada at risk of being targeted by Russian cyber attacks?
Whether it is music, applications, online purchases, or video games, nowadays everything goes through downloading. It is unfortunately one of the most used tactics by cybercriminals to infiltrate your children’s data and therefore yours too.
If for some, the word holiday rhymes with freedom, for others it is synonymous with opportunity. Indeed, for cybercriminals, it is a golden opportunity to infiltrate your systems and thus hack your data through a cyber attack. After all, cybercriminals do not go on holiday!
What company in 2022 is not dependent on an IT system?
Whether from a smartphone, a computer, or a tablet, these days all these elements are essential work tools.
In the event of a cyberattack, the integrity of the organization is at stake
In fact, over the past few years, we have seen a gradual change in the way citizens work, on a large scale. Thanks to the technological advances of the last ten years, more and more workers have preferred to work remotely or simply on their own.
We will not hide it, IT has taken a key place in our lives, and more particularly in the business world. Indeed, with the arrival of social networks, each company, regardless of the field it occupies, depends on technologies, and this to varying degrees.
It is no secret that a growing number of companies are facing the need to modernize their IT. Technologies are evolving, cybersecurity challenges are becoming a concern and some IT environments are becoming obsolete.
However, modernization is not just about putting together a list of services to update. Your business must evolve, needs change and your technological environment must adapt
No matter the size of your business, you are now a target. Cyber-terrorists have found their hobbyhorse and it is called: Ransomware.
Like most companies of a certain size, you have a vendor management team. Their mandate is very clear: to ensure that the company does not overpay for its products and services.
For those that have been planning IT architectures long enough, we can all remember the days. We used to look at the hottest technologies on Gartner’s Quadrant, and that was a reference. I no longer believe that. Times have changed, and so has the market. Here are 10 reasons why a best-of-breed approach can breed catastrophe only.
Do you still believe a properly planned firewall is a cornerstone to your cybersecurity? Here’s a clue, none of that matters if you haven’t laid a proper foundation.
So back to the question, do you believe that keeping an older security architecture protects you from modern threats? Good luck, you’re in for a ride.
We have to be grounded: every company is turning into an IT company within a few years. We can see that even retailers now need extensive systems to maintain inventory, accounting, etc. Yet, the number of candidates is stable.
We all have seen these grand transformation projects, which, in line with their massive scales, ended in massive failures or massive financial and timeline overruns.
face it: more than half of the servers sold don’t go to corporate data centers. They go to those of cloud providers. What’s more, these companies (Microsoft and Google in particular) have put considerable effort into reducing their environmental footprint and becoming carbon neutral.
For too many years now, you have suffered budget cuts. Tired of looking your IT infrastructure grows stale. You understand the need for transformation, for modernizing. You are also aware that your current mindset must evolve for the environment to do so.
The leaders of a software development company wanted to proceed with a digital transformation by moving all of their services to the cloud. They took all the services they had deployed on their internal servers and moved them to a similar cloud configuration. They used a typical “lift and shift” approach.
Cyber Security is complicated and can be prohibitively expensive. A dozen years ago, Cyber was a footnote on most corporate ledgers, but today it is a significant corporate cost, and often a topic of discussion at executive board meetings. Many corporate strategies...