Making the Digital World Safer for Children

ACSI is proud to be sponsoring the 2018 ATLE Professional Development Day for Alberta School Zones 2 & 3 on May 18th in Edmonton. As it is coming up, it is prudent to explore what IT administrators, educators, and parents can do to make the digital world safer for children.

Making the Digital World Safer for Children

ACSI is proud to be sponsoring the 2018 ATLE Professional Development Day for Alberta School Zones 2 & 3 on May 18th in Edmonton. As it is coming up, it is prudent to explore what IT administrators, educators, and parents can do to make the digital world safer for children.

Attending Aruba’s Atmosphere 2018 Conference

The last week of March, I joined over 3,000 tech experts to partake in Aruba’s Atmosphere 2018, a conference in Las Vegas that was an amazing opportunity not only to watch notable speakers, but also to keep up with the emerging trends in enterprise-class wireless, wired and security. These are my three takeaways from attending this fantastic event.

Digital workplace: The game changer for businesses

The emergence of smartphones, tablets, and the Internet of Things (IoT) devices has transformed the way we communicate, consume services, and manage our everyday lives. They have also changed the way businesses conduct operations.

Cyber Security Threats for SMB

 

Ransomware, cyberattacks, phishing schemes, and the Internet of Things (IoT) just some of the cybersecurity threats posed to small businesses. With cybersecurity becoming an area of increasing concern for SMBs, companies need to learn ways to protect themselves, their employees, and their files.

Cyberattacks Against Educational Institutions

Cyber attacks against educational institutions are becoming more and more popular because hackers see teachers and parents as being ill-equipped to deal with cyber threats. The lack of cybersecurity knowledge and that fact that schools hold sensitive data about students – such as the children’s’ medical records – makes them a hot target for cybercriminals.

Secure Network Access Built For Mobility

Discussions on the Internet of Things (IoT) have been very prominent in the enterprise technology world for some time now. However, we have not seen any real end-to-end IoT solutions -- until now.

With the emergence of IoT devices, the attack surface grew exponentially. This increase is because IoT devices can be managed by outside administrators and can be used to generate threats from remote locations.

According to Gartner, employees in today’s digital workplace use an average of three different devices in their daily routine. This number is expected to grow as wearable devices and IoT devices become more mainstream.

Since users can connect a variety of devices to wired and wireless connections, the concept of a fixed threat perimeter no longer exists. The increase of mobile and IoT devices open the enterprise network up to a variety of unforeseen risks, as well as security and compliance concerns. The need for more significant network security services is becoming necessary.

How IoT and Automation Are Changing the Security Network

Since its launch, the Internet of Things (IoT) has grown at an exponential rate.  Over the years, IoT has been introduced into almost every business sector and industry. In 2017, Gartner, Inc. predicted that 8.4 billion connected things would be used worldwide. The amount of IoT devices is predicted to almost triple by 2020.

IoT devices are not just used in the business sector. The consumer segment brought in the most IoT use with devices such as smart TVs, digital set-top boxes, home automation systems and smart automotive systems.

Build a Sustainable Security Program for Your Company

An IT security program has innumerable moving parts that work together cohesively to protect a company and its many assets. On their own, they can't do enough to safeguard what needs to be protected, but together, they can do great things.

CISO Best Practices for Protecting Company Assets

CISOs are constantly challenged with the ever-changing threat landscape and the evolution of IT infrastructure. There are more open networks that need to be secured, new technologies to adopt, malicious attackers to battle and defeat, and new identities to manage.

Prepare Your Company’s Toolkit to Survive Ransomware

Old styles have a way of once again becoming trends. Ransomware, once an old threat, has come roaring back to get money, hold files ransom, and disrupt businesses—just like in the old days. It has grown to such proportions that it has become one of the top forms of cyberattacks.

Recent Posts

Making the Digital World Safer for Children

ACSI is proud to be sponsoring the 2018 ATLE Professional Development Day for Alberta School Zones 2 & 3 on May 18th in Edmonton. As it is coming up, ...

Read more

Attending Aruba’s Atmosphere 2018 Conference

The last week of March, I joined over 3,000 tech experts to partake in Aruba’s Atmosphere 2018, a conference in Las Vegas that was an amazing opportun...

Read more

Digital workplace: The game changer for businesses

The emergence of smartphones, tablets, and the Internet of Things (IoT) devices has transformed the way we communicate, consume services, and manage o...

Read more

Cyber Security Threats for SMB

  Ransomware, cyberattacks, phishing schemes, and the Internet of Things (IoT) just some of the cybersecurity threats posed to small businesses. With ...

Read more