2021 Cybersecurity Attacks that are Threatening Businesses

It seems as though every day we hear about another business that’s victimized by a data breach. In the first half of 2021 there were 1767 publicly reported data breaches which led to the exposure of over 18 billion confidential records. Yes, we said billion. And, the businesses that were lucky enough to not become […]
Cybersecurity: Seven Approaches For Improving Employee Buy-In

Cybersecurity is a must for modern businesses: Cybercrime accounted for more than $1.33 billion in monetary damages in 2016, according to a report on Statista. While companies are deploying numerous security measures, cybersecurity only works as well as the weakest link — meaning employees who may not be up-to-date, or onboard, with security routines have the potential to let […]
Security: a Top Consideration for Apps

Today, nearly every organization is looking to extend their offering though mobile applications in one form or another. From near exponential growth in mobile telehealth applications to innovative medical devices being accessible through mobile applications, we’re finding today that organizations are moving outside their typical model for providing value to their clients, and supplementing their […]
Watch International Cyber Attacks Take Place in Real Time

Security issues have become a hot-button topic for Toronto iPhone app developers and software developers around the world. With cyber crime and hack attacks continuing to make headlines, several new websites that claim to track hacking activity in real time have cropped up. These sites feature maps that show both the targets and the sources […]
Samsung Adding Iris Scanners to Future Phones

With smartphone manufacturers racing to become the first to introduce biometric security to their devices, Samsung recently tipped its hand by revealing that the company is actively researching iris-scanning technologies. Implemented in a smartphone, iris scanners would ensure that nobody but the registered user would be able to access the phone’s contents. With users becoming […]