Data Management Life-Cycle: Data Preservation

data preservation

Business owners operating in today’s landscape will commonly acknowledge the importance of backing up critical business data. With several media and seemingly complex methods available to choose from, the decision making process is often a daunting task when the concepts are beyond your area of expertise. Often times management will select the most inexpensive option as they are unable to truly comprehend the consequences associated with the selections presented to them.

As a trusted business adviser, we at Compulite choose to empower our clients with the knowledge needed to make important business decisions that will impact (either positively or negatively) their company. While some may find it difficult to grasp the technical components of a complex backup structure, the high-level details we’ve included throughout this post should give some insight into how your approach to backups can be structured. Read more +

How to Leverage GeoFencing and Geo-IP Filtering for Your Business

Geofencing

As technology advances and becomes more accessible, consumers and businesses alike are able to take advantage of more cost effective, feature-rich solutions not previously available to them. Geofencing and Geo-IP filtering for hardware and software used to be a very costly tool implemented for very specific use cases. It is now technology featured in almost every smart phone, firewall or router most consumers already have in their possession, and is the foundation of several applications and services. Read more +

Using SharePoint as a Contract Management Solution

Contract Management

Contract management becomes more complex as your organization continues to grow. A scalable system needs to address the moving elements and personnel obligations intertwined with managing contracts. It should also increase efficiency and ensure compliance is met throughout the management process.  Using a customizable solution like SharePoint as your contract management system (CMS), will make efficient use of your time when it comes to searching or compiling contract information. Read more +

How A Universal Back Door Impacts Your Device

universal back door

A “golden key” or a universal back door method, allows the bypassing of normal authentication in a product, computer system or algorithm. If used ethically it can be used for securing remote access to a computer system or for debugging purposes. The controversy surrounding golden key methodology stems from the fact that in the wrong hands, it can also open up physical access to those with malicious intent.

Major hardware manufacturers like Apple, Microsoft and Blackberry have taken publicly dissimilar positions on releasing universal back doors to their devices. As the world increasingly depends on devices supplied by these few suppliers, it is important to know where they stand, so you have an idea where your sensitive personal data is likely to end up. Read more +

Security Matters Most When Managing Legal Matters

security law firm

As law firms strive to become more efficient and move towards the much sought after “paperless” office environment, cyber security must remain at the forefront of any technology initiative. But how can law firms be expected to manage and protect their network infrastructure in addition to managing client matters and cases? While technology can certainly help manage the workload, it shouldn’t have to be a part of your firm’s core competencies. Read more +

Botnets: The Unseen Army Ruling The Internet

botnets

Botnets are robot networks made up of computers, or any device with network connectivity (computers, security cameras, smart TV’s, smart thermostats, etc.). Botnets have a  long history in technology, as they have been around since the early days of the internet. While commonly perceived to be malicious in intent (and rightfully so), botnets do not exclusively perform destructive commands.  Read more +

How Microsoft’s Edge Browser Leads with Security

Edge Browser

Ottawa wins top rankings, in a game no one wants to be playing.

It is the malware infections (including phishing and ransomware) rate that Ottawa ranks highest in, even when compared to a city like Toronto where the population is significantly higher.  Our city has taken notice, as Ottawa Hospital, Carleton University and several non-profit charities have fallen victim. In an effort to combat the attacks, Prime Minister Justin Trudeau announced last summer the public consultation on cyber security strategy, while the IT industry as a whole strives to share threat information about emerging threat vectors. Read more +

Canadian Digital Privacy Act (Part Two)

Privacy

The Digital Privacy act, originally passed in 2015, has updated elements of its legislation that will require Canadian businesses to adhere to strict guidelines and policies in order to protect confidential information and disclose security breaches. While each organization will have to prioritize its defenses, there will be certain criteria every one will have to follow. While official standards will be released later this year, there are steps you can and should implement immediately to improve you company’s security posture. Read more +

Canadian Digital Privacy Act (Part One)

digital privacy act

As a response to the ever-evolving cyber-security threats Canadian businesses face in daily internet interactions, the federal government has responded. Later this year, newly drafted hacking disclosure legislation will require all businesses in Canada to report any cyber security breach as soon as they become aware of it. Read more +

Removing Communication Barriers with Microsoft Stream

Made available for preview during the summer of 2016, Microsoft Stream now allows businesses to upload and share videos to improve communication, participation and learning throughout their organization. We’ll investigate how the latest Office 365 offering can impact the workplace, and see it if delivers as Microsoft promises –to empower organizations with better ways to get work done.

Read more +

2
8