With the cybersecurity landscape constantly evolving, organizations must constantly pivot to manage the potential consequences of increasingly sophisticated attacks. One of SysGen’s three-pronged approaches to cybersecurity is People. Together with…...
According to Canadian Business Journal, small and medium businesses are particularly susceptible to fraud which could result in major financial challenges. As much as 5% of an organization’s yearly income…...
In 2004, Bill Gates proclaimed that using a password to protect computer information is “dead”. As the founder of Microsoft and the head of the largest software company, he was…...
In recent years, remote work has become prominent in the workplace. While starting as a necessity, businesses continue to see the advantages of their employees working remotely. Benefits include saving…...
Due to the COVID-19 pandemic, many have been forced to shift to the new normal of physical distancing. While working from home was initially mandatory for everyone, as government regulations…...
Meet Michael Silbernagel, CISSP; he’s one of our in-house cybersecurity experts at SysGen. Michael is a lifelong technology enthusiast and is passionate about cybersecurity, cloud computing, IoT and blockchain. We…...
The spread of COVID-19 has evolved quickly and unexpectantly closing borders, offices, and schools around the world. With that, many organizations have moved to remote work to maintain business operations…...
The amount of corporate data being transferred between devices with mobility, cloud services, and virtualization solutions has continued to increase year over year. With mobile and big data trends, the…...
It can be daunting to understand how to protect yourself and your organization with effective cybersecurity measures. Especially when seemingly infallible organisations such as Uber, Under Armour, Hudson Bay Co. and Facebook are successfully…...
Everything to know about ransomware to keep your company afloat. It can be simple for malware to attack a computer network and take data hostage with a fee required for…...
Our website uses cookies to improve user experience. By continuing using this website you consent to all cookies in accordance with our Terms of Use and Privacy Policy.