Is COVID-19 today’s Y2K?

Draconian responses did more to kill the economic, social, spiritual and educational lives of citizens than stop fatalities

Is COVID-19 today’s Y2K?Twenty-one years ago, the world panicked over an invisible, media-hyped enemy. That enemy was Y2K, a problem whose shadow was much larger than its substance. Unfortunately, COVID-19 may be this era’s equivalent of that ‘millennium bug.’ The Y2K problem was essentially this: many computers had two digits for dates. If they went to 00, the…

Too many fault lines in digital voting process

The shambles of the Iowa caucuses reconfirms that electronic voting is still a long way off

Too many fault lines in digital voting processThe recent Iowa caucuses debacle reminded me of two things. First, my about-face as a member of the New Brunswick Commission on Electoral Reform with respect to electronic voting. Second, further confirmation that the electronic infrastructure continues to be an impediment in advancing digital democracy. The 21st century has empowered humanity with electronic connectivity and…

Protect yourself from financial phishing

Welcome to the predatory online scamming world. Fraudulent emails, often containing links or attachments, are dangerous. If it seems too good to be true, it is

Protect yourself from financial phishingBeware the phishing hook. Phishing describes an attempt to get you to unknowingly disclose personal information such as credit card details, banking information, usernames and passwords. The party trying to gather your information will try to hook you by sending you an email and asking you to click on a link. The email will look…

10 Data Security Facts for Small Business Owners

When you understand the threats you’re facing, it becomes much easier to adapt your practices in a way that better enables you to keep your data safe. With that in mind, here are ten facts you need to know about data security

10 Data Security Facts for Small Business OwnersWhen we think about cybersecurity, viruses and hackers in the shadows tend to be considered as the most important threats faced today. It’s important to note, however, that it is entirely possible to compromise entire servers of data without a single virus or individual hacker being the cause. This is one of the reasons why…

Most Canadian organizations hit by cyber-attacks in past year

Cybersecurity awareness training is effective but only 22% conduct training at least monthly

Most Canadian organizations hit by cyber-attacks in past yearA new survey finds that 71 per cent of Canadian organizations reported experiencing at least one cyber-attack last year that impacted them in some way, including time and resources, out-of-pocket expenses and paying ransom. The Canadian Internet Registration Authority’s  2019 Cybersecurity Survey Report also found that 96 per cent of respondents said that cybersecurity awareness…

Cloud apps most vulnerable to cyber attacks: report

Explosion of cloud entities has led to decisions to make security as much of a priority as speed

Cloud apps most vulnerable to cyber attacks: reportIn August 2019, an unsecured database belonging to Choice Hotels provided too big a temptation to resist for hackers. Some 700,000 records were stolen, with hackers demanding ‘ransom money’ for their return. The Choice Hotel Group - which has properties in the U.S., Canada, and worldwide - was able to avoid a wipe of this vital…

Creating an unnecessary barrier between doctors and patients

A convoluted – and doomed – communication portal in Nova Scotia has failed the health care system and its users on both sides

Creating an unnecessary barrier between doctors and patientsMost businesses encourage clients to electronically access their own information because consumers value the efficiency and convenience of electronic access. Unfortunately, the Nova Scotia Department of Health (DOH) has a different idea. It has been a successful barrier preventing most Nova Scotians from retrieving and using their own health information. Few Nova Scotians have access…

We must manage the Internet of things with care

Who will ensure devices have been tested thoroughly and are secure? Who will ensure our privacy is protected?

We must manage the Internet of things with careBack in the early 1990s, I came across a story about a Coke machine that you could query from anywhere on the Internet and it would tell you the temperature of the drinks, the last time it was stocked and how full it was. The machine was in the computer science department of Carnegie Mellon…

3 Devices You Must Protect From Cybercrime

3 Devices You Must Protect From CybercrimeWe use the internet for almost everything, from shopping to connecting with friends to finding out more about the world in general. We also use it for business in many instances, and although the internet has opened up a vast new world in which to sell, it has also brought with it a number of…

How To Feel Free Online

How To Feel Free OnlineNowadays, it’s really important to take care of online safety due to a great number of hacker attacks. Tor, VPN, other services allow you securing a trade secret and getting access to sites and services not available in one or another region. Recently, the popularity of anonymous web surfing has increased significantly. If you are…
1 2 3 5