Thoughts, Insights, Ideas, Trends and Op-Eds

How to Protect Your Business from Ransomware Attacks

Since May 2017, malware and ransomware attacks have been on the minds of business leaders across the planet. Although most of us have enhanced our cybersecurity protocols, the war on ransomware is far from over. Over the last few weeks alone, ransomware has been able to penetrate the systems of the PGA of America and the borough of Matanuska-Susitna in Alaska.

Read More...
Recent
Most popular
ecommerce project development

Seven Programming Languages Best Suited For eCommerce Solution Development

eCommerce has evolved significantly over the past decade and is expected to surpass a $2 trillion annual haul by the end of 2017, according to IBM. There are a lot of Content Management Systems (CMS), hosted solutions, and plugins freely available for you to set up your online retail presence.
10-Canadian-Tech-Startups-to-Watch-in-2018

10 Canadian Tech Startups to Watch in 2018

The Canadian tech ecosystem is booming with startups regularly attracting some serious investment. Many of these young companies are also showing that they can overcome early challenges and grow both revenue and personnel.
build app with MEAN stack in Vancouver

How to Interview a MEAN Stack Developer

So you’re looking to hire a MEAN stack developer for your bootstrap startup or established company and you’re going to conduct the interviews yourself. What questions should you ask to identify the candidate that will be a good fit for your team and project?

What Businesses Should Know About Whitelisting

In recent years, the popularity of open source frameworks and publicly released proof of concept techniques have contributed to the rise of cyber attacks. For example, Magento, a popular cloud-based e-commerce platform with an open-source ecosystem recently had almost a 1,000 compromised CMS admin panels.

How to Reduce Security Flaws and Vulnerabilities in the Software Code

Software today is often riddled with security flaws and vulnerabilities that bad actors can leverage to gain access to IT systems. In fact, according to a study (based on 268 penetration tests) conducted by security firm Rapid 7, only 16% of the software companies investigated were in the clear.