Technology Trends, Chief Technology Officer, CTO, Blockchain, Security Breach, Design Thinking Process, Passwords, End-Point, Agile Adoption, technology consulting, Artificial Intelligence, GDPR, Digital Experience, Digital Transformation, Security, InfoSec

Our Top 10 Favourite Blog Topics From 2018

2018 has been a year of rapid technology growth. We have seen changes to the security landscape, an increased adoption of AI and continued generational adjustments to our workforce.  As we look back over the last 12 months, we wanted to share some of our favorite blog posts from 2018 that touch on some or all of these topics: from risk and security assessment, to user experience, design thinking, business consulting, and everything in between. Happy reading!

Read More
By Jamie Michie on Dec 10, 2018 1:07:47 PM
Passwords, Hacker, Cell Phone, Juice Jacking, Security Breach, USB Ports, Black Friday, Cyber Monday

3 Ways to Protect Your Data From Hackers

(A friendly reminder from our RSP team on practical ways you can avoid being a target of identify theft when shopping on & offline this holiday season.)

What's Your Cellular Data (Protection) Plan?

There’s no shortage of stories from around the globe on new ways that hackers are learning to access our personal data.  Important preventative measures include keeping up-to-date antivirus software, having an active firewall, and using strong passwords.  Even with these controls in place, this can lead to a false sense of security.

While many of us focus on protecting laptops and computers, we often don’t stop to think about protecting our personal or work-assigned smartphones, which is exactly what criminals are counting on. 

Read More
By Security Consulting Team on Nov 23, 2018 4:27:17 PM