Tag Archives: security

How strong is your weakest link? Cisco Midyear Security Report Highlights Weak Links in Threat Landscape

This summer saw the release of the Cisco 2014 Midyear Security Report, the latest examination of “weak links” in organizations – such as outdated software, bad code, and user errors – that could pose serious security threats. The Report indicated … Continue reading

Posted in Cisco, Security | Tagged , , , , , , | Leave a comment

Increasing ethics training is the answer to cyberthreats

By Stephen Ibaraki This article is an excerpt of a larger piece that appears on IT World Canada and is republished with permission. Over 90 per cent of networks are compromised and this can happen in less than 20 minutes … Continue reading

Posted in All Posts, Internet of Everything, Security | Tagged , , , , , , , , , , , | Leave a comment

Using Technology to Stimulate the Economy of Small and Medium-sized Businesses in Quebec

There is much talk of delayed productivity in Quebec. This problem should not be taken lightly, since, in the current context of globalization, it has become important for Quebec to increase its exports and efficiency in order to get ahead … Continue reading

Posted in Small and Mid-size Business | Tagged , , , , , , , , , , , , , , , | Leave a comment

Security Threats are Becoming More Common in the Financial Sector

Because they are facing cyber attacks planned by professionals, financial institutions must take extreme measures.  As guardians of the assets of individuals and companies, the financial industry has always been a choice target for hackers. The year 2014 will be … Continue reading

Posted in Cisco, Financial Services | Tagged , , , , , , , , | Leave a comment

The Cisco Email Security Appliance (ESA) is your Answer to the Canadian Anti Spam Legislation (CASL)

The recent introduction of the Canadian Anti-Spam Legislation (CASL) requires Canadian companies to verify whether individuals have given permission to receive messages that may be marketing or otherwise considered SPAM. The Cisco Email Security Appliance (ESA) has several built-in features … Continue reading

Posted in All Posts | Tagged , , , , , | Leave a comment

Putting the ‘Everywhere’ in Advanced Malware Protection Everywhere

It’s no secret that we’re more focused today on security than we have ever been. It began last year with our landmark acquisition of Sourcefire and continued in April when we announced Cisco Managed Threat Defense Service (MTD). MTD was … Continue reading

Posted in All Posts, Security | Tagged , , , , , , , , , | Leave a comment

How To Secure Your Organization’s Mobile Devices

Today, cybercriminals and Canadian business leaders share a common challenge: both are trying to figure out how best to leverage Bring-Your-Own-Device (BYOD) and mobility trends to further their operations. In fact, IDC Canada recently released a report on Canadian mobile … Continue reading

Posted in Borderless Networks, Security | Tagged , , , , , , , , , | Leave a comment

IT Infrastructure and Cloud Services Conference

Networking and meeting with potential customers and partners is only one of the benefits you will receive by attending the twelfth annual iTech Conference, happening on May 15th, 2014. The focus of the conference is on IT Infrastructure and Cloud … Continue reading

Posted in Data Centre, Virtualization and Cloud, Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Trust Issues: Cisco Annual Security Report 2014

It’s that time of year again, it’s January and that means it’s time for resolutions, new beginnings and looking forward to the year ahead. The Cisco’s 2014 Annual Security Report does just that, forecasting the top security risks and trends … Continue reading

Posted in Cisco, Security | Tagged , , , , , , , , , | 1 Comment

The Security of Networked infrastructure and Intelligent Communities

This is the first of a short series of blogs on topics that continue to be raised in my travels and interactions with customers and stakeholders of intelligent communities. Very often, our discussions focus on cost and funding models, stakeholder engagement, … Continue reading

Posted in Internet of Everything, Smart + Connected Communities | Tagged , , , , , , , , | Leave a comment