EU GDPR – The Final Countdown

In May 1986, a little-known Swedish band called Europe released their international breakthrough album, The Final Countdown – topping the charts in 25 countries. Thirty years later in May 2016, the European Commission released the official EU General Data Protection Regulation (GDPR) – another international breakthrough with a far greater global impact, albeit on the data privacy and protection landscape. But when legislation becomes law on May 25th 2018, will you be prepared? With just one year left, it’s the final countdown.

Requirements of Security Independence in a Virtualized World

As we evolve more and more to complete self-contained services like the mainstream Cloud services of Microsoft, Amazon, IBM and Google, I often express concerns about the Cyber aspects being coupled.  Enterprises and users are, if they haven’t already, getting more and more comfortable with giving up their physical/virtual servers, applications and storage but are not, and should not, be comfortable giving up control of their sensitive data.  The shared responsibility models of Cloud Services Providers (CSPs) delineates between the physical aspects (network, disks, memory, etc.) and the responsibility of what resides in the storage and computer.

Tech Support With Headset IT

4 Building Blocks of an Exceptional Customer Experience

Since I became Senior Manager of Technical Support at WinMagic about seven months ago, my mandate has been to take the support organization here to the point where they were consistently delivering an exceptional customer experience. To do that, I needed to build a solid foundation using the skills and observations that I have acquired from elsewhere. My first step in this was to audit the technical support team and identify areas where improvement was needed or more focus needed to be applied. Through observation, looking at the metrics that were being gathered, and even learning the product so that I could take customer calls in the interest of seeing firsthand what customers experience was, I was able to come up with these key building blocks as part of my foundation for exceptional customer experience. Since February 1st, we’ve been tracking these key items:

Future Leaders of Tomorrow Doing Great Stuff Today

Recently, I got the opportunity to be a judge at the Nahani-Glenforest Lego Robotics Competition. This is a competition where groups of grade 1 and 3 students from Nahani Way Public School work with high school students from Glenforest Secondary School to build and program Lego robots to do specific tasks. For yours truly, this was an opportunity to give back to the community and inspire the next generation who will take up careers in science, technology, engineering and mathematics (STEM). This was a high profile event as in attendance was Mississauga Mayor Bonnie Crombie as well as Navdeep Bains who is the Minister of Innovation, Science and Economic Development for the Government of Canada.

Overcoming Weak Password Compliance

Have you taken the #LayerUP pledge? It’s an ingenious way to get people’s attention on a topic that might be considered frivolous, but which could result in some rather costly consequences if not followed – and that topic is Password Compliance.  In enterprises, getting all of the employees to adopt password best practices on a consistent basis can be very difficult – especially since its human nature to use repetitive patterns or familiar phrases as passwords. Why? Because password requirements are everywhere, and the demand from IT departments to make them lengthier and more complex continue to grow and well, let’s be honest, the more passwords you have, the more likely you are to forget them.

SEDs, Sleep and Hibernation

I have written about the security implications of using sleep with encrypted drives in the past  and have offered both short term and longer term solutions that would allow users to use sleep under some conditions and not risk (too much) a data breach.   Today I am writing to offer another, common sense, alternative: Just don’t use sleep because you don’t really need it.

Approaches Canadian SMBs Are Taking to Become Secure

One of many common denominators that modern corporations face regardless of size, industry vertical and revenue is technical vulnerability. Without reiterating the monetary impact and disruption to business that IT attack’s result in, taking a proactive and engaged approach is your best defense. The reality of the starting point is that Canadian small and medium businesses are faced with obstacles right off the bat such as:

Best Encryption

Reach BitLocker’s Full Potential with the BitLocker Toolkit

Best encryption with our BitLocker toolkit

Find the best encryption solution for BitLocker with our BitLocker toolkit

Being a security professional can be tough if you don’t have the right tools for the best encryption. And some of the tools in your arsenal are native encryption solutions, like BitLocker, which provide a strong first step in data security. But with your IT environment growing ever more complex – having multiple devices, operating systems, and strapped resources – it’s time to start managing your environment the smartest way.

HIPAA in 2017: failing to plan equals planning to fail

Another day, another breach. In a relatively unsurprising start to 2017, healthcare breaches are on track to reach new heights (or is it depths?). In what has become a somewhat satirical annual tradition, analysts forecast upcoming breach trends for the notoriously hard hit healthcare industry, and title each year with a fitting name. In 2015, it kicked off with the Year of the Healthcare Breach. In 2016, it was the Rise of Ransomware. So as I was reading about yet another breach in April, a question came to mind, what will “Year of the” be for 2017?