BY DEAN REID, MAY 29, 2019
SECURITY

What it’s like inside the chaos of a cyber-attack

Every disaster movie starts the same way. Happy people joyfully going about their daily lives, completely unaware of the panic and chaos that is about to befall them. This is exactly how it is in the minutes and hours leading up to a cyber-attack. There is no warning, no lead time to prepare. It’s just calm one moment and bedlam the next. How would you react if right this second, your organization was hit with  …>> more

Take The First Steps Today Towards The Autonomous Network of Tomorrow

Evolve or dissolve. This is the mantra of just about every business organization in the marketplace today. Everyone is under the same pressure to stay ahead of the ever-changing business and technology landscape or face the potentially dire consequences. At the forefront of this modern workplace transformation is the decision by many organizations to transition to an autonomous network. An autonomous network is one where many of the day-to-day network IT decisions and adjustments are  …>> more

How to find the right IT security partner

Beyond the technical issues that businesses face with IT security, the greatest stumbling block to making change and implementing effective solutions is the human element, which boils down to two key problems – you don’t know what you don’t know, and although you inherently shouldn’t trust anyone, you have to trust someone. In the previous entries in this series by my peer Joshua Wood, you read how IT security has become a growing and unavoidable  …>> more
BY LOU TETSOS, JANUARY 31, 2013
MOBILE WORKING, SECURITY

At Hamilton Health, you can bring your own tablet to work

One of my favourite topics is how organizations are overcoming the security challenges of supporting user devices on a closed network. Hospitals in particular are a great example because patient information is highly sensitive data. Here is what is happening at Hamilton Health Sciences . At this hospital, physicians had become so enamoured with tablets that they were practically demanding the organization support the use of their devices so they could quickly and easily access patient  …>> more

Tablets, physicians, and love letters at Ottawa Hospital

One of my favourite topics is how organizations are overcoming the security challenges of supporting user devices on a closed network. Hospitals in particular are a great example because patient information is highly sensitive data. At Ottawa Hospital, until recently, physicians who wanted to access information such as patient records or diagnostic images were tethered to a workstation, either in their office, at a nursing station or out on the units. However, the past year  …>> more