Expert Advice
The adoption of connected devices for home use has skyrocketed and is not likely to slow down.
I’ve worked in the technology industry for over 20 years, and in that time, I’ve lent my expertise in strategizing and implementing business-focused IT to everyone from small businesses to global corporations. As my company is a purveyor of comprehensive private and public cloud environments, we’re primarily concerned with giving organizations every IT component they need to power their business in a cohesive and streamlined way. This not only includes elements like virtual servers, desktops, email, and Microsoft Office, it also entails ensuring that cybersecurity measures are built into the fabric of the IT infrastructure.
When I look back at the most significant changes in the security industry over the past several decades, two trends stand out: the rise in public and corporate awareness of security as a retail service to be consumed, and the growing sophistication of some institutional consumers of security services.
A direct relationship exists between how quickly a business can identify and contain a security incident and the financial consequences. On average, the time to identify and the time to contain a threat are 229 and 82 days, respectively — alarmingly lengthy spans of time.
Canadian Security is celebrating its 40th anniversary in 2018. We asked several security professionals to submit their thoughts on the industry and reflect on 40 years of change. In each issue of Canadian Security magazine, we will feature a new columnist. Second is Roger Miller, president of Northeastern Protection Service.
With 2017 now behind us, many CIOs are looking ahead. They’re grappling with big questions but the No. 1 priority should be cybersecurity.
Canadian Security is celebrating its 40th anniversary in 2018. We asked several security professionals to submit their thoughts on the industry and reflect on 40 years of change. In each issue of Canadian Security magazine, we will feature a new columnist. First is Jason Caissie, vice-president of operations for The Profile Group and a past chair of the ASIS Toronto chapter.
Enterprises are able to collect more data than ever before, but without an efficient way to manage and secure that data across the enterprise, whether it resides on physical and virtual servers, multiple Cloud providers, applications or endpoints, they will never be able to realize the full benefits of a truly data-driven and secure business. Security needs to be built into the data management platform from an end user’s computer to backup storage, regardless of whether it resides on-premise or in a private, public or hybrid Cloud.
From an outsider's perspective, in order to become an International Close Protection Operative it should be pretty straight forward, right? They just have to be big, no-necked, muscle-bound and be able to jostle their way through the swathes of people in a crowd with their Principal, yes?
With each passing day, more and more consumers are making the switch to online shopping. And why wouldn’t they? It’s quick, reliable and easy. As a consumer, you can have nearly any item you can imagine delivered to your door (in some cases same day) without ever having to leave the house.
Page 1 of 3

Subscription Centre

 
New Subscription
 
Already a Subscriber
 
Customer Service
 
View Digital Magazine Renew

We are using cookies to give you the best experience on our website. By continuing to use the site, you agree to the use of cookies. To find out more, read our Privacy Policy.