International Data Privacy Day: Strong, Sensitive, Secure
25 January 2018
While the majority of North Americans were asking Santa for new tech, we were busy building a contingency plan to protect our existing devices. In December, we were all wishing for things. In January, it’s time to take action to protect our technology and sensitive data from prying eyes, ears, and keyboards.
Tips for Secure Online Shopping
9 December 2015
Increasingly more people are opting to do their holiday shopping online rather than subject themselves to the chaos of crowded malls this time of year. Saving people time and energy over the hectic holiday season is no doubt a great benefit brought by the evolution of the internet, but it doesn’t come without its own unique set of evils.
Recent incidents of cybersecurity and data theft have brought light to the risks consumers face when sharing and entrusting their sensitive data with corporations and third party institutions. Malicious intentioned cyber criminals continue to develop new, tech-savvy ways to hack into people’s private accounts for the purpose of stealing sensitive information.
Protect your data while doing your holiday shopping online this month with these tips and safety precautions.
Data Safety on and off the Internet
9 February 2015
If data safety was a coin, data protection would be one of the sides and the other would be data destruction. On Safer Internet Day, we’re thinking about how all of our data – information we create, information created about us, etc – relates to our safety.
Don't be fooled. Deleting files doesn't remove them.
1 April 2008
The revelation in 2007 that a laptop computer which contained personal information regarding members of the Canadian Alliance party, the predecessor to the Conservative Party, was purchased on eBay is yet another important reminder that sometimes data needs to be destroyed, not simply deleted, especially when computers change hands.
As...
Protecting Your Data From Identity Theft
4 October 2007
Identity theft doesn’t just happen when somebody sorts through your garbage or steals your wallet. Thieves can steal your digital identity as well.
Like many of us in the technology field (or even the home user) we’ve accumulated several PC’s which are no longer used. Wait! Before you decide to trash...