top of page


Navigating Canada's Cybersecurity Mandates: Bill C-8, CMMC, CPCSC, and CAN/DGSI 104
For Canadian businesses that hold contracts or sub-contracts within the critical infrastructure, telecommunications, energy, finance, transportation, or nuclear power industrial segments, it means there is an ever increasing need to have a comprehensive understanding of a complex web of cybersecurity regulations.Â
Terry Telford
Aug 279 min read
Â
Â


Your Preliminary Guide to CPCSC and CMMC for Canadian Defence Sub-Contractors
The defence contracting rules of engagement have changed. For small and medium-sized defence subcontractors in Canada or the U.S., the landscape has shifted from a "trust me" handshake to a "show me" mandate. The days of simply having a great product or service are over. Today, your ability to win and keep lucrative contracts hinges on your company's cybersecurity posture, verified by two powerful new frameworks, CPCSC and CMMC
Terry Telford
Aug 197 min read
Â
Â


Zero Trust for Canadian SMBs: A Smart Investment for Economic Growth
Canadian Small and Medium Businesses (SMBs) are increasingly in the crosshairs of sophisticated cybercriminals. Ransomware, phishing scams, and devastating data breaches can cripple operations, erode customer trust, and even lead to business failure. This is where Zero Trust emerges. It’s a paradigm shift in the cybersecurity world.
Terry Telford
Jul 249 min read
Â
Â


What is the Best Security Information and Event Management System (SIEM) for Your Business?
While your existing antivirus software and basic firewall are essential foundational elements, they are, unfortunately, no longer sufficient to combat the sophisticated and evolving tactics of modern cyber adversaries. You need a SIEM
Terry Telford
Jul 2114 min read
Â
Â


IoT Security for SMBs: Definitive Guide to Safeguarding Your Connected Business
Canadian small and medium-sized business (SMB) owners are constantly looking for ways to boost efficiency and stay competitive. The Internet of Things (IoT) helps with cost savings like smart thermostats saving on energy bills, connected security cameras providing peace of mind, or even smart inventory systems streamlining operations. IoT devices promise a future where everything works seamlessly, making your business smarter and more agile.Â
But here's the catch
Terry Telford
Jul 145 min read
Â
Â


Navigating the Cloud: Understanding Security and Compliance with Your Cloud Service Provider (for Canadian SMBs)
The shift to the cloud has been game-changing for Canadian Small and Medium-sized Businesses (SMBs). It offers scalability, flexibility, and cost-effectiveness that were once out of reach. However, with this immense potential comes the crucial responsibility of ensuring your data remains secure and compliant with Canadian regulations. A significant part of this responsibility lies in understanding and adhering to the security standards established by your Cloud Service Provid
Terry Telford
Jul 76 min read
Â
Â


Ransomware: To Pay or Not to Pay
A 2023 Statistics Canada report revealed that Canadian Small and Medium Businesses (SMBs) paid between $10,000 to $500,000 per Ransomware incident. The question is, do YOU pay it. Discover Canadian SMB best practices.
Terry Telford
Jun 245 min read
Â
Â


Fortifying IoT Security: Vulnerability & Patch Management for Canadian SMBs
The Canadian business landscape is undergoing a profound digital transformation. While hackers used to concentrate on endpoints like...
Terry Telford
Jun 1611 min read
Â
Â


The Ransomware Playbook: 6 Steps Attackers Use to Target Canadian SMBs
Ransomware. For Canadian Small and Medium-sized Businesses (SMBs), it’s an escalating danger. The unfortunate reality is that...
Terry Telford
Jun 109 min read
Â
Â


Future Regulatory Trends and Challenges: Emerging Cybersecurity Regulations and Standards
Consider this stark reality: a recent report by the Insurance Bureau of Canada indicated that the average cost of a data breach for Canadian small and medium-sized businesses (SMBs) now exceeds $100,000. Beyond the financial hit, the reputational damage can be even more devastating, eroding customer trust and potentially leading to business closure. Â
Terry Telford
Jun 29 min read
Â
Â


Affordable Cybersecurity Solutions for Canadian Insurance SMBs
In the world of Canadian insurance, your reputation is everything. Trust, built on the promise of security and reliability, is the...
Terry Telford
May 275 min read
Â
Â


Beyond the Policy: Strengthening Cybersecurity for Canadian Insurance Companies
Lets unpack cybersecurity best practices, with a specific focus on insurance companies and navigating the complexities of data breach reporting obligations under Canadian law. Understanding these obligations is paramount for ensuring compliance, maintaining client trust, and mitigating the fallout from a potential cyber incident.Â
Terry Telford
May 205 min read
Â
Â


5 Key Cybersecurity Strategies for Financial Advisors & Small Financial Firms
For Small to Medium-sized Businesses (SMBs), navigating the cybersecurity landscape with limited resources and IT support means being an attractive target for cyber threat actors. Implementing the following 5 key cybersecurity strategies sets a baseline for operations, helps protect clients' sensitive information in accordance with Canadian law, and helps with compliance in this evolving threat environment.Â
Terry Telford
May 39 min read
Â
Â


Shielding Your Success: A Practical Guide to Data Protection for SMBs
A data breach can lead to devastating financial losses, reputational damage, legal liabilities, and ultimately, the erosion of customer trust.Â
As a small or medium-sized business (SMB) owner, you might think that cyber threats primarily target large corporations. They're not.
Terry Telford
Apr 226 min read
Â
Â


What Does CPCSC Mean for Canadian Defence Contractors?
Safeguarding Canadian security and economic stability is paramount, and vulnerabilities in our defence supply chains have become a...
Terry Telford
Apr 63 min read
Â
Â


Access Denied: Real-World Applications of Least Privilege
Least Privilege. It's not just a buzzword; it's a fundamental strategy that minimizes risk by granting users and systems only the permission
Terry Telford
Mar 175 min read
Â
Â
![How to Build an Incident Response Plan [with examples]Â](https://static.wixstatic.com/media/2ada9a_624cced3f1c448ca83246f6fe732be3a~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/2ada9a_624cced3f1c448ca83246f6fe732be3a~mv2.webp)
![How to Build an Incident Response Plan [with examples]Â](https://static.wixstatic.com/media/2ada9a_624cced3f1c448ca83246f6fe732be3a~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/2ada9a_624cced3f1c448ca83246f6fe732be3a~mv2.webp)
How to Build an Incident Response Plan [with examples]Â
The question isn’t IF you’ll be attacked by a hacker, it’s WHEN. It doesn’t matter if you are a one person shop, or you have 500...
Terry Telford
Mar 135 min read
Â
Â


Fortifying the Human Firewall: The Indispensable Power of Cybersecurity Employee TrainingÂ
Use this Employee Security Awareness Training checklist as your comprehensive guide to developing a powerful security awareness program.
Terry Telford
Mar 610 min read
Â
Â
bottom of page