Skip to content
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • Home
  • About UsExpand
    • About DigiVie
    • Case StudiesExpand
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • CommunicateExpand
    • IP TelephonyExpand
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage ITExpand
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • ContactExpand
    • Contact Us
    • Client Portal
    • inTouch Connect
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • Protecting Your Business Mac Computer from Cyber Infections: Tips to Know

    Protecting Your Business Mac Computer from Cyber Infections: Tips to Know

    November 28, 2019December 8, 2019

    Tips to Protect Your Mac Computer from Cyber Threats Mac computers have an excellent reputation when it comes to cybersecurity, but they can still be targeted. Find out about protecting your Mac from threats. Malware, ransomware, phishing—the cyber threats on the internet abound, and these threats are generating an astounding cost to the people who…

    Read More Protecting Your Business Mac Computer from Cyber Infections: Tips to KnowContinue

  • What Are Your Company’s Responsibilities Following a Data Breach?

    What Are Your Company’s Responsibilities Following a Data Breach?

    November 17, 2019December 8, 2019

    Learn from Marriott’s Example: Notification Responsibilities After a Data Breach Most states, the District of Columbia, the Virgin Islands and Puerto Rico have passed legislation regarding notification of security breaches. Know the laws in your state.   To answer this question, let’s start with the example experienced by Marriot International recently when a breach exposed the…

    Read More What Are Your Company’s Responsibilities Following a Data Breach?Continue

  • Stop Hackers Cold: Eliminate These Common Entry Points

    Stop Hackers Cold: Eliminate These Common Entry Points

    November 8, 2019December 8, 2019

    Weak Points in Cybersecurity Hackers Love Do you know where hackers are most likely to gain access to your private data? Discover the favorite entry points and how you can stop them.   It seems like every week that there are reports of another massive data breach hitting the news. The number of users affected…

    Read More Stop Hackers Cold: Eliminate These Common Entry PointsContinue

  • Want To Drastically Enhance Your Small Business Cybersecurity?

    Want To Drastically Enhance Your Small Business Cybersecurity?

    November 4, 2019December 8, 2019

    No matter how secure you may be right now, you could always be doing more. Have you double-checked your cybersecurity lately? Review the best practices below to strengthen your small business cybersecurity. When everything is going well, the last thing you want to do is think about what will happen when something goes wrong. It’s…

    Read More Want To Drastically Enhance Your Small Business Cybersecurity?Continue

  • What Cybercrime Will Dominate 2020?

    What Cybercrime Will Dominate 2020?

    October 22, 2019December 8, 2019

    Now may be a good time to invite in cybersecurity specialists to evaluate your system and recommend ways to avoid cyber threats in 2020.   Techradar gurus predict that 2020 cyber threats will look a lot like the cast of characters responsible for many of the breaches that have occurred over the past few years. Here’s…

    Read More What Cybercrime Will Dominate 2020?Continue

  • Ransomware: How Secure is Your Business?

    Ransomware: How Secure is Your Business?

    October 17, 2019December 8, 2019

    Safeguarding Your Computer System From Ransomware These days, ransomware attacks are on the rise, and just one can devastate your business. Discover seven ways you can protect your company from cybercriminals.    Your business hasn’t been a victim of a ransomware attack yet? Don’t press your luck. Ransomware poses a real threat. The number…

    Read More Ransomware: How Secure is Your Business?Continue

  • How Can You Celebrate October National Cybersecurity Awareness Month?

    How Can You Celebrate October National Cybersecurity Awareness Month?

    October 9, 2019December 8, 2019

    Celebrate October National Cybersecurity Awareness Month October is National Cybersecurity Awareness Month. It provides a framework for companies, individuals, and organizations to examine past and current cyber threats to reduce their risks.     October is National Cybersecurity Awareness Month. Started by the Department of Homeland Security, it provides a framework for companies, individuals, and organizations…

    Read More How Can You Celebrate October National Cybersecurity Awareness Month?Continue

  • Locking Down Endpoint Security

    Locking Down Endpoint Security

    September 24, 2019December 8, 2019

    Mobile Devices on Your Network? Use Endpoint Security Software Mobile devices used for telecommuting can compromise your network. To keep your sensitive data safe, use a firewall, antivirus and endpoint security software.   In today’s mobile environment, companies that offer employees the opportunity to telecommute often gain the upper hand. But allowing workers to access…

    Read More Locking Down Endpoint SecurityContinue

  • Factsheet on Mobile Applications and Cybersecurity

    Factsheet on Mobile Applications and Cybersecurity

    September 16, 2019December 8, 2019

    FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of these concerns, we’ve put together a quick factsheet on mobile applications and cybersecurity. Here are a few tried and true ways to protect yourself: Download applications from trusted sources only and do your…

    Read More Factsheet on Mobile Applications and CybersecurityContinue

  • Google Docs Being Used to Attack Users With TrickBot Banking Trojan

    Google Docs Being Used to Attack Users With TrickBot Banking Trojan

    September 14, 2019December 8, 2019

    Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the word processing program for a phishing scam that disseminates TrickBot malware.   Take extra caution if you receive a Google Docs document sharing email in the near future — it may be…

    Read More Google Docs Being Used to Attack Users With TrickBot Banking TrojanContinue

  • Cyber Security is Vital for Small Businesses

    Cyber Security is Vital for Small Businesses

    August 16, 2019December 8, 2019

    Small Business Tech Security Small businesses need to take cyber security seriously, preventing lapses or weak points that could lead to major data breaches or attacks.   Modern technology is rapidly changing the landscape for small businesses. Small companies can now do more and have a far greater reach, but they are also faced with…

    Read More Cyber Security is Vital for Small BusinessesContinue

  • New Phishing Threat Presents Security Challenge

    New Phishing Threat Presents Security Challenge

    July 30, 2019December 8, 2019

    Phishing Attacks Target OAuth Credentials to Gain System Access Discover how an increasingly popular authentication process, OAuth, can be exploited by hackers and wreak havoc on applications and access sensitive data. What Is OAuth? OAuth is a widely used framework that allows applications to share access to assets. It lets unrelated services and servers to…

    Read More New Phishing Threat Presents Security ChallengeContinue

Page navigation

1 2 3 Next PageNext

Latest News

  • Best Practices for Secure Data Backup

    These days, everything is digital. We deal with data every day: from personal photos to…

    Read More Best Practices for Secure Data BackupContinue

Company

B1-1002 Beaverbrook Road, Ottawa, ON K2K 1L1

(613) 277-2312

info@digivie.com

Services

Network Security
Secure Business Cloud
Data Protection
Business Telephone Systems
Managed IT

Newsletter Sign Up

Receive email updates and informative marketing materials by subscribing to our newsletter.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Copyright © 2026 DigiVie. All rights reserved.

  • Privacy Policy
  • Home
  • About Us
    • About DigiVie
    • Case Studies
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • Communicate
    • IP Telephony
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage IT
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • Contact
    • Contact Us
    • Client Portal
    • inTouch Connect