When you have something important, you make efforts to keep it safe. You wouldn’t leave your credit card out on a bench and walk away, or leave your house keys at the mall with your address attached. Sounds far fetched but it’s essentially what we are doing with personal information every day. Your online data, from what you enter to
Read more →Blog
What is the GDPR? The General Data Protection Regulation is a framework of legal guidelines for collection and processing of personal info of individuals within the European Union. Or, in short, it’s a set of rules that companies need to follow to collect and protect a user’s data. As of May 25th, 2018, any company, group, or individual, that handles
Read more →No one likes being told what to do, especially when you are being told you are doing something wrong. This is why the topic of balanced technology management is not a popular one. We all love our phones, computers, and TVs but we’ve become so reliant on these things for simplifying our lives and entertaining us that we are running
Read more →Many people have heard about Bitcoin and cryptocurrency but, like many new technologies, most wave it off as being too complicated to understand. Not so. Given how much I enjoy demystifying tech for others, I’ve broken it down in a way that even a grade 5 student can understand it. And for reference, I did run this by an actual
Read more →When I started my career as a software developer, the word cybersecurity was thrown around as a technical term describing how computer data was encrypted and protected within an electrical system. Fast forward a few decades and now cybersecurity affects everyone who touches a digital device. The problem is many people still feel like it’s a technical issue that they
Read more →As the internet expands, so do the ways criminals find to abuse it. The best way to protect yourself and your business is to be diligent about how, where, and when you share information. Cybersecurity has become a huge issue. No matter how good your technological defences are, it is usually a person, not a machine, that gives up access
Read more →My friend pulled me aside and, in a hushed voice, told me that he was worried his device was listening to him when he spoke to his wife at home. He said he had mentioned something in a live conversation, that he swears he had never typed, and then he started getting ads for it. The nervous question came “Is my
Read more →