Contact Us

|

Careers

|

Change Locale
close

The Softchoice Blog: Security

Featured Article
Security | July 22, 2019 by Tosan Martey
Softchoice leads the way on integrated and industry-leading threat intelligence, offering a wide array of advisory, implementation, managed, technical and optimization services. “Softchoice has emerged as a clear leader by proving that they have the specialized skills necessary to be the trusted security partner for Canadian businesses.” – Michael Tryon, Managing Director, Cybersecurity, Cisco Canada. […]
Featured Article
Security | June 1, 2019 by Susana Byun
One of the most hyped use cases of software-defined networking (SDN) is micro-segmentation — and for a good reason. With solutions such as VMware NSX, micro-segmentation promises several high-value business outcomes. These include modern security, seamless operations and optimized user experience. Learn the key three reasons why you should consider micro-segmentation for your organization.
Featured Article
Cloud | December 6, 2018
Moving Beyond Cloud FUD It is necessary that companies be able to take advantage of a newly connected business world. These days, the speed, mobility, and flexibility offered by the cloud are just table stakes. It’s vitally important that your company overcomes the fear, uncertainty, and doubt (FUD) that can surround the cloud.
Featured Article
Security | November 14, 2018 by Susana Byun
The IT community has come full-circle on security in the cloud. A few years ago, any IT professional would have shuddered to imagine storing information in someone else’s data center. Today, cloud and hybrid IT are facts-of-life for many businesses.
Featured Article
Security | October 9, 2018 by Jonas
One of the greatest threats to cybersecurity is human error. According to UK consultancy Willis Towers Watson, careless behavior causes 90% of data breaches. The finest threat intelligence in the world won’t matter if your administrator fails to configure your networks properly. Anti-malware solutions won’t matter if they’re not consistently applied. If one phish gets through […]
Featured Article
Security | August 21, 2018 by Arun Kirupananthan
The IT world is changing. It’s no longer enough to build firewalls against known threats. Now the CIO must anticipate how these threats will evolve in the future. Cloud computing is becoming the norm, while online threats are growing. The Internet of Things (IoT) and smart devices have now taken hold in the office. These […]
Featured Article
Security | July 16, 2018
The squeaky wheel gets the grease. The good news is Cisco devices don’t squeak often. But even devices as solid as Cisco’s don’t last forever. Just like every other device, they have a life cycle. After the end of the life cycle, also known as the Last Day of Support (LDOS), to keep them around is to embrace […]
Featured Article
Security | April 18, 2018 by Chris Martin
A cybersecurity incident hits your organization. What you do next makes the difference between containment and a catastrophe. You may think your incident response (IR) strategy comes into play on Day 0. But without a playbook written and rehearsed in advance, your organization struggles to get back to “business as usual.”
Featured Article
Security | November 29, 2017 by Chris Martin
Season two of Netflix’s blockbuster sci-fi show Stranger Things wasn’t written by IT security pros — but there’s enough overlap to make you wonder. From scary creatures breaching into our world because of a few stupid humans to using an all-knowing “spy” to watch the bad guys and predict future attacks… if you squint enough, you can see the show as a metaphor for the advanced security. It might even give you some inspiration for what you can do to stay safe!
Featured Article
Enterprise Software | November 13, 2017 by Emily A. Davidson
We just launched The Amplify Vendor Flipbook to help curate, highlight and share technology news and advice that might not be on your radar…yet. Amplify is an inclusive, vendor flipbook. It offers a way to review information about new vendors and their technology.
Featured Article
Security | September 28, 2017 by Arun Kirupananthan
J. Peter Bruzzese is a Microsoft MVP with over two decades of experience.He walks us through why we need to beef up Office 365 Security.
Featured Article
Security | August 21, 2017 by Softchoice Advisor
All solutions have their pros and cons. Office 365 has more pros than one can count. For example, Exchange Online pulls Exchange Server into the cloud as a hosted multi-tenant cousin of its on-premises self. Not having to worry about your email server’s hardware and upgrades is a dream come true for many. Office 365 […]
Featured Article
Security | November 25, 2016 by Arun Kirupananthan
It’s estimated that 20% of all tablets shipped will be for enterprise workers by 2018. While the proliferation of tablets in the workplace offers many benefits, it also opens the door to a host of new security risks
Featured Article
Security | November 18, 2016
Your data is moving in and out of the cloud, to all your employees, on many devices, at anytime and anywhere. The traditional style of protecting your data no longer exists. Keeping the bad guys outside the perimeter, and your data locked inside isn’t enough. That’s why we created this infographic in partnership with Cisco. It explains how security attacks have increased in sophistication, and created larger, more targeted and advanced persistent threats.
Featured Article
Security | August 19, 2016 by Tania Stadnik
BlackBerry is about more than just handheld devices. The hot topic among CIOs is—and always has been—security. As tech news continues to be overrun by endless data breaches, hackers and privacy issues, organizations that value data security stand by BlackBerry in a way that is incomparable to any other mobile provider. Decades after first appearing on the market, BlackBerry continues to set the corporate standard for mobile security. Here’s why…
Featured Article
Security | July 29, 2016
Data security is a continuous battle against malicious forces—one in which the key to a successful strategy is information. Click here to read on.
Featured Article
Security | July 29, 2016 by Emily A. Davidson
Think your endpoint security is enough to guard against today’s advanced targeted attacks? You may need to think again.
Featured Article
Security | July 29, 2016 by Softchoice Advisor
You have no fear of catching Zika, unlike the thousands of people in Rio. Feeling safe, you navigate to the official broadcast site of the games and click on Watch the Olympics live…
Featured Article
Security | July 25, 2016 by Softchoice Advisor
The FBI recently published a report claiming that ransomware victims paid out over US$209 million just in the first quarter of 2016, compared to US$24 million for all of 2015. Ransomware has very quickly become the most fashionable malware on the market, flooding the threat landscape in ways never seen before. We are seeing new strains of ransomware almost every single day. Click here to learn more.
Featured Article
Security | July 21, 2016 by Softchoice Advisor
Hybrid cloud environments are the new norm for many enterprises, but are they being secured in the best way possible? Are hybrid cloud deployments secure? Find out here.
Featured Article
Security | May 12, 2016 by Andrea Knoblauch
Ransomware: it might sound like the title of the next summer blockbuster, but this clever little portmanteau has become one of the most insidious malware threats. Learn more here.
Featured Article
Security | May 5, 2016
The consequences of failed endpoint security are making headlines across the world. So in the light of such an event, there is no better time to take a hard look at your own network systems and see if all of your company’s sensitive data is protected from security threats – both within and outside of your organization.
Featured Article
Security | November 16, 2015 by Richard Carson
Editors note: Due to popular demand, this blog post has been refreshed with an additional webinar event titled 3 Actions to Consider from Cisco Support Contract Changes on June 14th, 2016. Click here to register. You might have heard about Cisco’s newly branded Smart Net Total Care service — a merger of its existing SMARTnet support and […]
Featured Article
Security | October 5, 2015 by Emily A. Davidson
As of October 3rd 2015, Veritas has once again become an independent company. If you use Veritas products, stop searching, we have all the info you need to know.
Featured Article
Security | September 22, 2015 by Tobin Dalrymple
Dear passwords, we need to talk. This letter has been a long time coming, and it can’t wait anymore. I don’t really know where to begin, so I am just going to cut to the chase. I’m breaking up with you. It’s over. We are done-zo. Finito. Ancient history. Here’s why.
Featured Article
Security | July 20, 2015
We’ve been hearing about the potential benefits of using a security solution designed specifically for virtual environments for a few years. Unfortunately, many infosec departments continue to protect virtual environments with traditional, or legacy, approaches. While this is certainly a step in the right direction, something many see as “good enough,” the fact is traditional security […]
Featured Article
Security | June 15, 2015 by Tobin Dalrymple
Now that the VENOM vulnerability has been dealt with, it’s time for technologists to seriously consider how ready they are for virtualization security. Especially if you’re working in an organization with a significant investment in the cloud, this is one area you can’t afford to ignore any longer. The VENOM vulnerability was discovered last May […]
Featured Article
Security | June 4, 2015 by Emily A. Davidson
It takes less than half a second for a user to unknowingly infect your network. In this blog post we cover the five stages of a malware attack, and how to analyze your environment for complete protection.
Featured Article
Security | May 12, 2015 by Emily A. Davidson
If you’re considering Backup Exec 15, this blog post has (almost) every detail you need to know in 15 questions. I parsed through Veritas’ documentation to provide the top 15 things you need to know about Veritas’ latest release. So let’s jump right in.
Featured Article
Security | April 29, 2015
Purchasing the best-of-breed solutions in each security category has left many IT teams managing disparate tools. Now, IT managers feel more like they are managing a zoo, than a well connected security posture.
Featured Article
Security | March 23, 2015
There is no form of communication more prevalent in business than email. Which is why it’s surprising to discover how many organizations fail to employ every possible strategy to protect their email infrastructure from catastrophic failure. With Spear Phishing attacks (and other types of threats) happening regularly, and at a rapid pace, there has never […]
Featured Article
Security | March 23, 2015 by Emily A. Davidson
In this post I identify helpful links and tips from Symantec experts and reveal how to get a fast expert-led analysis of Symantec Endpoint Protection for free – before you switch.