Building Your InfoSec Program

Our Best Practices for Securing your Macbook

Our Best Practices for Securing your Macbook

Posted on April 2, 2020 - by Kyle Hankins

MacOS has privacy and security tools for hardening your computer. Here are our top tips and best practices to for securing your Macbook. Many of these tips are pretty straightforward, ...

Read More
Reporting on Your Information Security Framework Compliance

Reporting on Your Information Security Framework Compliance

Posted on February 12, 2020 - by Darren Gallop

How to generate reports on your security program for customers or board members Businesses need answers to critical questions about their compliance with security controls. Companies often lean on their ...

Read More
During Covid-19 Pandemic, Businesses Should Prepare for Increase in Cyber Crime

During Covid-19 Pandemic, Businesses Should Prepare for Increase in Cyber Crime

Posted on March 13, 2020 - by Darren Gallop

A global pandemic and troubling economic trends spell trouble ahead for businesses without strong cybersecurity plans in place   As the coronavirus is spreading, we are recommending to our ...

Read More
How to Use the CIS Controls Framework for Your Business

How to Use the CIS Controls Framework for Your Business

Posted on January 15, 2020 - by Justin Gratto

For businesses, leveraging a framework like CIS Controls makes sure your company and customer data stay safe. You want to use trusted security and privacy frameworks for your business and ...

Read More
Why Your Business Needs a Penetration Test

Why Your Business Needs a Penetration Test

Posted on December 28, 2019 - by Justin Gratto

When it comes to developing cybersecurity strategies, planning and assessing existing infrastructure only goes so far. To create an airtight security plan, you also need to view your company from ...

Read More
Tips for Creating a Security Awareness Training Program

Tips for Creating a Security Awareness Training Program

Posted on December 10, 2019 - by Russell Radzikowski

Are your employees trained on how to keep confidential information safe? Information security and privacy rely on employees taking the right actions to safeguard this valuable asset. An awareness training ...

Read More
6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

Posted on December 4, 2019 - by Laird Wilton

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
What to Know About Security Awareness Training for Your Business

What to Know About Security Awareness Training for Your Business

Posted on November 27, 2019 - by Russell Radzikowski

Security awareness training used to be a topic that only specific industries, or enterprise businesses, cared about. But with the rapid increase in cybercrime in the last several years, startups ...

Read More
Security Best Practices for Your Windows 10 Computer

Security Best Practices for Your Windows 10 Computer

Posted on November 18, 2019 - by Darryl MacLeod

Windows 10 comes with tons of great features for your business, including privacy and security tools for hardening your computer. This guide gives you our top tips and best practices for ...

Read More
Top Security Services and Tools for Your InfoSec Program

Top Security Services and Tools for Your InfoSec Program

Posted on November 5, 2019 - by Russell Radzikowski

If you're implementing a new InfoSec program to protect your company or demonstrate compliance, you WILL need policies. First, before you do anything else. You can't just google "security policies ...

Read More
What NOT to Say During a Security Audit of Your Startup

What NOT to Say During a Security Audit of Your Startup

Posted on September 16, 2019 - by Darren Gallop

Founders and CTOs often say or do terrible things in security audits. Over the last three years, I have personally played a role in over 100 vendor security audits as both ...

Read More
Why Every Company Needs a Disaster Recovery Policy

Why Every Company Needs a Disaster Recovery Policy

Posted on July 10, 2019 - by Darren Gallop

If a company relies on computers, it is highly likely that an IT failure would have a negative impact on the business - and make you wish you had a ...

Read More
But First, Security Policies and Procedures

But First, Security Policies and Procedures

Posted on July 5, 2019 - by Russell Radzikowski

I’ve seen first-hand what happens when companies fail to fully implement information security policies and procedures. It's hard to do it properly on your own. That's why as the ...

Read More
Top Security Trends for 2019

Top Security Trends for 2019

Posted on July 2, 2019 - by Darren Gallop

Now that we’re halfway through 2019, let’s take a look at our top five security trends for the year 2019. Some of these might seem obvious to you, which means ...

Read More
Staying Secure on Social Media

Staying Secure on Social Media

Posted on May 14, 2019 - by Darren Gallop

Social media is an almost unavoidable part of our daily lives. Whether that be personal use or professional, we’re exposing ourselves every day. This is why, as business owners, ...

Read More
4 Tips for Implementing Physical Security

4 Tips for Implementing Physical Security

Posted on April 26, 2019 - by Darren Gallop

In our world of online information security, most of the time people are thinking about passwords and server protection. While these are obviously very important things to be thinking about, ...

Read More
The Process Behind Third-Party Risk Management

The Process Behind Third-Party Risk Management

Posted on April 24, 2019 - by Darren Gallop

The decision to use a particular service or software is often already made before third-party risk management is engaged. Common process would be that a department head decides they want ...

Read More
A Security Guide to Surviving Tax Season in Canada

A Security Guide to Surviving Tax Season in Canada

Posted on March 21, 2019 - by Amy MacNeil

Tax season security is just one more thing to worry about. All year round, scammers try to impersonate the Canada Revenue Agency - through phone, text, email phishing or paper ...

Read More
Network Security in a Shared Workspace

Network Security in a Shared Workspace

Posted on March 13, 2019 - by Russell Radzikowski

Securing a business network seems straight forward when you have your own office or building that hosts only your employees. For many start-ups and smaller businesses, their physical office might ...

Read More
How to Build Your Security Team

How to Build Your Security Team

Posted on March 5, 2019 - by Darren Gallop

Building a security team within a company can be a time consuming and confusing process. There are many roles and branches of the Security Team. When assembling your team it’...

Read More
Information Security from a Customer Success Perspective

Information Security from a Customer Success Perspective

Posted on February 27, 2019 - by Russell Radzikowski

Implementing an information security program can seem like a daunting task for any company. Whether you are starting a security program for the first time, looking to consolidate your security ...

Read More
How to Secure Your Business for Free [Free Security Tools]

How to Secure Your Business for Free [Free Security Tools]

Posted on February 22, 2019 - by Darren Gallop

Many companies, especially small businesses or startups, start off with an information security program that relies on free security tools. One of the biggest hurdles to overcome in setting up ...

Read More
Securicy Launches Free Tools for Small Businesses

Securicy Launches Free Tools for Small Businesses

Posted on February 19, 2019 - by Colin MacInnis

The Struggle of Information Security Free tools can do a lot to improve things for small businesses. Information security has been an expensive part of business for many years. ...

Read More
How Big Tech Companies Can Regain Customer Trust

How Big Tech Companies Can Regain Customer Trust

Posted on January 22, 2019 - by Darryl MacLeod

Distrust towards big tech firms has grown around the world. Users have legitimate reasons to be concerned about the large amounts of personal data they share with these companies. Big ...

Read More
Guide to Starting a Basic Risk Assessment

Guide to Starting a Basic Risk Assessment

Posted on September 26, 2018 - by Laird Wilton

A risk assessment is one of the first steps in implementing your information security program, which will help provide an overview of your entire business. You'll use it to track ...

Read More
The Greatest Obstacle to Security Programs

The Greatest Obstacle to Security Programs

Posted on September 13, 2018 - by Laird Wilton

You'd think every business that deals with customer information and data would have a security program in place by now. But that’s not the reality. There are trends and ...

Read More
How to Start Implementing a Cybersecurity Program

How to Start Implementing a Cybersecurity Program

Posted on August 28, 2018 - by Laird Wilton

It is a major mistake to run a small or medium-sized business without any kind of cybersecurity program. But it’s not necessarily your fault, if that's the situation you ...

Read More
Buyers are Scrutinizing the Data Protection Practices of SMBs

Buyers are Scrutinizing the Data Protection Practices of SMBs

Posted on June 15, 2018 - by Laird Wilton

It’s no surprise that customers have high expectations for companies when it comes to data protection. In fact, 71% of consumers believe organizations have an obligation to control access to ...

Read More
A Poor Cyber Security Posture Damages Your Sales

A Poor Cyber Security Posture Damages Your Sales

Posted on June 12, 2018 - by Laird Wilton

If you’re a small business that’s selling, or hopes to sell, products to larger companies /organizations, you need to level-up your cyber security posture. Any weakness in your ...

Read More
Protecting Your Intellectual Property

Protecting Your Intellectual Property

Posted on May 8, 2018 - by Darryl MacLeod

Your intellectual property (IP) is your company’s holy grail. It’s what you put out into the world to get a return in revenue. And because there are ...

Read More
1 in 30 Canadians Affected by Facebook Data Breach

1 in 30 Canadians Affected by Facebook Data Breach

Posted on April 12, 2018 - by Laird Wilton

Facebook has announced how many Canadians have been impacted by the Cambridge Analytica data breach and the number is quite surprising. 622,161 Canadians have had their personal data shared with the ...

Read More
GDPR: What it Means for Your Sales & Marketing Team

GDPR: What it Means for Your Sales & Marketing Team

Posted on April 6, 2018 - by Laird Wilton

You may have heard about GDPR (General Data Protection Regulation). It’s a new regulation that affects business owners that work with the personal data of European citizens. Companies ...

Read More
How to Setup an Incident Response Plan

How to Setup an Incident Response Plan

Posted on April 3, 2018 - by Darryl MacLeod

Incident response plans are a critical part of any business's information security program. We know that it’s important for employees to care about cybersecurity - but what do they ...

Read More
How to Make Your Team Care About Cyber Security

How to Make Your Team Care About Cyber Security

Posted on March 23, 2018 - by Darryl MacLeod

Whether they know it or not, employees are on the frontline of the defence against cyber attacks. The mindset of “it won’t happen to us”, when it comes to ...

Read More
How to Encrypt a Partition in Linux

How to Encrypt a Partition in Linux

Posted on March 20, 2018 - by Darryl MacLeod

You can protect your data by encrypting a partition in Linux. With Linux, you actually have a number of ways to add encryption to your servers and desktops. One of ...

Read More
How to Install Antivirus on Linux (Ubuntu)

How to Install Antivirus on Linux (Ubuntu)

Posted on March 15, 2018 - by Darryl MacLeod

Linux is generally considered to be more secure than other operating systems. However, it’s increasingly a target of attackers; as Linux systems are used for critical roles like web ...

Read More
Best Practices for Printer Security

Best Practices for Printer Security

Posted on March 15, 2018 - by Darryl MacLeod

Printer security is an easy topic to overlook in your information security program. But don't make that mistake at your company. The printers in your office can be an easy ...

Read More
How to Setup a Password Protected Screensaver in macOS

How to Setup a Password Protected Screensaver in macOS

Posted on March 8, 2018 - by Darryl MacLeod

Protecting your Mac’s screensaver with a password is simple. Yet many users don’t think about doing it. If you’re a Windows user, don’t worry, we have ...

Read More
Employees, You Are The Weakest Link

Employees, You Are The Weakest Link

Posted on March 6, 2018 - by Darryl MacLeod

When an employee signs a policy they acknowledge they have read and understand the document but is that really the case? Turns out, the answer is no. A ...

Read More
Strong Passwords and 4 Types of Passwords You Should NEVER Use

Strong Passwords and 4 Types of Passwords You Should NEVER Use

Posted on March 1, 2018 - by Darryl MacLeod

Strong passwords are a good defense against persistent cyber attackers but weak passwords can be the entryway to confidential data and operating systems. While there are so many types of ...

Read More
Protect Your Business During Tax Season

Protect Your Business During Tax Season

Posted on February 27, 2018 - by Colin MacInnis

Between Winter and Spring there is another season that brings its own highs and lows: tax season. This is when hackers think that businesses are at their most vulnerable. These ...

Read More
What is the “Internet of Things (IoT)?”

What is the “Internet of Things (IoT)?”

Posted on February 23, 2018 - by Colin MacInnis

Living in the 21st Century, we are surrounded by the “Internet of Things.” From the moment we wake up and brew a pot of coffee to when we set the ...

Read More
How to Disable Automatic Login in macOS

How to Disable Automatic Login in macOS

Posted on February 16, 2018 - by Darryl MacLeod

Automatic login can be either a useful feature for devices in the workplace... or a vulnerability in your security program. When you set up a new Mac, or do a ...

Read More
How to Turn on The Firewall in macOS

How to Turn on The Firewall in macOS

Posted on February 15, 2018 - by Darryl MacLeod

MacOS includes an easy-to-use firewall that can prevent potentially harmful incoming connections from other computers. To turn it on or off: From the Apple menu, select System Preferences.When the ...

Read More
How To Turn on The Firewall in Windows 10

How To Turn on The Firewall in Windows 10

Posted on February 15, 2018 - by Darryl MacLeod

You might be required to enable the Windows Firewall by your job. Or disable it to use alternative software based on your company's security policies. In Microsoft Windows 8 and 10, you ...

Read More
How to Backup Your Mac

How to Backup Your Mac

Posted on February 14, 2018 - by Darryl MacLeod

MacOS has a built-in backup tool called Time Machine. Once you plug in a hard drive and set up Time Machine, it will work automatically in the background, continuously ...

Read More
How to Enable Auto-Updates in macOS

How to Enable Auto-Updates in macOS

Posted on February 6, 2018 - by Darryl MacLeod

Apple makes it easy to enable auto-updates for your macOS. It all happens in the background while you’re going about your day. Apple will never install an update without ...

Read More
How to Use a Password Manager

How to Use a Password Manager

Posted on February 5, 2018 - by Darryl MacLeod

Password managers are great. We all know the struggles of staring at the computer screen trying to remember the password to a login. Thankfully, password management tools exist to save ...

Read More
Securicy Policy Builder Launches in TechStars Boston Accelerator Program

Securicy Policy Builder Launches in TechStars Boston Accelerator Program

Posted on February 1, 2018 - by Darren Gallop

Securicy, a Cape Breton, Nova Scotia and Boston, Massachusetts-based provider of end-to-end cybersecurity tools and resources for small and mid-sized business,  announces today the launch of Policy Builder, ...

Read More
How Do I Set a Windows Screen Saver Password?

How Do I Set a Windows Screen Saver Password?

Posted on January 18, 2018 - by Darryl MacLeod

A password-protected screen saver can protect your computer for those moments when you need to step away for a coffee refill. THIS GUEST BLOG COMES TO US FROM COMPUTER HOPE (...

Read More
4 Ways Startups Can Protect Network Security: A Risk-Based Approach

4 Ways Startups Can Protect Network Security: A Risk-Based Approach

Posted on December 1, 2017 - by Darryl MacLeod

You have a great idea for a startup. So you come up with a solid business plan. You pitch it over and over and over. You get funding. Everything is ...

Read More
7 Steps to Protect Your Personally Identifiable Information

7 Steps to Protect Your Personally Identifiable Information

Posted on October 6, 2017 - by Darryl MacLeod

In light of the Equifax data breach, it is extremely important for organizations to protect their personally identifiable information (PII). Governments are ramping up regulations and fines (see our&...

Read More
Why North American Companies Should Care About GDPR

Why North American Companies Should Care About GDPR

Posted on September 21, 2017 - by Darryl MacLeod

GDPR isn't just for tech companies in the European Union. As a measure to improve the levels of protection of European Union citizens' data, the European Parliament adopted the General ...

Read More
How to Recover From a Data Breach

How to Recover From a Data Breach

Posted on September 11, 2017 - by Darryl MacLeod

Considering that a data breach can happen to any company, at any time, being proactive is often the best tactic. If you suspect that you are a victim ...

Read More
Don’t Keep Your Head In The Cloud: 5 Ways To Secure Your Local Data Backups

Don’t Keep Your Head In The Cloud: 5 Ways To Secure Your Local Data Backups

Posted on August 14, 2017 - by Darryl MacLeod

Local data backups are still an essential element of an effective security program for many organizations, even in the age of Amazon Web Services, Google Cloud, and Microsoft ...

Read More
Email Security: A Phishing Tale

Email Security: A Phishing Tale

Posted on July 5, 2017 - by Darryl MacLeod

Email phishing is tricky - it often comes from a sender you already know and trust. A few weeks ago my wife told me that she got an unexpected email ...

Read More
4 Things You Can Do Today to Protect Yourself from Ransomware Attacks

4 Things You Can Do Today to Protect Yourself from Ransomware Attacks

Posted on June 28, 2017 - by Darryl MacLeod

With attacks like Petya and WannaCry, ransomware has reared its ugly head again. While a recent threat primarily targeted Windows systems, you should still be vigilant when it comes ...

Read More
Cybersecurity Policies: A Cheat Sheet [with Templates]

Cybersecurity Policies: A Cheat Sheet [with Templates]

Posted on June 8, 2017 - by Darryl MacLeod

Cybersecurity policies are necessary for all technology businesses at this point. Your company must have information security policies in place and demonstrate that you are following them. The trouble is ...

Read More
5 Things to Secure Your Company Against Cyber Threats

5 Things to Secure Your Company Against Cyber Threats

Posted on February 24, 2017 - by Laird Wilton

Cyber threats are a serious business concern. Businesses and not-for-profit organizations are processing and storing larger and larger quantities of information about clients, members, employees, and partners. Much of it ...

Read More