Featured Blogs
The Ultimate Guide to Safe Sharing Online
We live in a world that thrives on digital connectivity. According to We Are Social, Canadians are now spending half a day more...
The Ultimate Holiday Shopping Guide
The holidays are almost here! That means it’s time to start making your list and checking it twice. To help prepare you for...
The VORACLE OpenVPN Attack: What You Need to Know
Many of us know that using a VPN (Virtual Private Network) adds an extra layer of security to our Wi-Fi...
The Wearable Future Is Hackable. Here’s What You Need To Know
Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...
The Week That Was In Internet History
From the wheel to the internet, we have come a long way in terms of technological progress. While the invention...
The What, Why, and How of AI and Threat Detection
There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet...
The Wild West of AI: Do Any AI Laws Exist?
Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all the mentions of...
The World’s Most Deepfaked Celebrities Revealed
Scammers most targeted celebrities by deepfake scams. Learn why these stars are exploited and how to detect and protect yourself from digital fraud.
The Year That Was – Cybersecurity Takeaways From 2018
So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...
