Skip to content
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • Home
  • About UsExpand
    • About DigiVie
    • Case StudiesExpand
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • CommunicateExpand
    • IP TelephonyExpand
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage ITExpand
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • ContactExpand
    • Contact Us
    • Client Portal
    • inTouch Connect
DigiVie
(613) 277-2312
Facebook Twitter Linkedin YouTube
  • What Are the Most Serious Cybersecurity Stories of 2019?

    What Are the Most Serious Cybersecurity Stories of 2019?

    July 19, 2019December 8, 2019

    We’re only halfway into 2019, yet data protection specialists and IT analysts have already seen an unfortunate spike in criminal activity across industries. Thus far, here are the biggest cybersecurity crises of the year. 2019’s Top Cybersecurity Stories #1 – Supply chain attacks Unique to 2019 is a growing trend of supply chain attacks. Supply…

    Read More What Are the Most Serious Cybersecurity Stories of 2019?Continue

  • Mac Operating Systems Vulnerable to New Security Exploit

    Mac Operating Systems Vulnerable to New Security Exploit

    July 9, 2019December 8, 2019

    A recently discovered security vulnerability could leave Mac users exposed to malware disguising itself in other programs. If your business relies on Mac, it’s important to know how you can protect your company from falling victim to a cyberattack. What is the Security Vulnerability? In early 2019, security expert Filippo Cavallarin discovered a bug in Apple’s Gatekeeper…

    Read More Mac Operating Systems Vulnerable to New Security ExploitContinue

  • Acquiring A New Business? Check Their Cybersecurity Posture

    Acquiring A New Business? Check Their Cybersecurity Posture

    July 3, 2019December 8, 2019

    Buying a company is no small undertaking, even if the company is considered “small” by industry standards. Due diligence is a huge part of the process. Anyone considering purchasing business must review a whole host of issues with the company to ensure that they are making a good decision. Things like accounts receivable, market position,…

    Read More Acquiring A New Business? Check Their Cybersecurity PostureContinue

  • Why Security Awareness Training Makes Sense for Your Small Business

    Why Security Awareness Training Makes Sense for Your Small Business

    July 2, 2019December 8, 2019

    Your small business needs a cybersecurity strategy, but beyond that, it also needs security awareness training. These two areas are not one and the same. There are important, distinct differences. The Importance of a Cyber Security Strategy First, let’s talk about cybersecurity in general. By now you likely understand the importance of cybersecurity for your…

    Read More Why Security Awareness Training Makes Sense for Your Small BusinessContinue

  • The #1 Security Threat to Local Small Businesses

    The #1 Security Threat to Local Small Businesses

    June 20, 2019December 8, 2019

    There are many types of risk in business: the risk that a new competitor will come on the market and steal market share, the risk that top staff members will jump ship for a better offer . . . but are you considering the significant risk that is associated with a cyber attack? A recent…

    Read More The #1 Security Threat to Local Small BusinessesContinue

  • What Are Tracking Cookies? Are They Bad?

    What Are Tracking Cookies? Are They Bad?

    June 5, 2019December 8, 2019

    For today’s tech blog we’ll tackle a topic that’s become much more visible over the last couple years. What are tracking cookies? How do they get on your devices? Can they harm your devices? We’ll answer these three questions in this post. What Are Cookies? Tracking cookies are a specific type of cookie, so we…

    Read More What Are Tracking Cookies? Are They Bad?Continue

  • 5 Crucial Elements to Training Your Employees in Optimal Cyber Security

    5 Crucial Elements to Training Your Employees in Optimal Cyber Security

    May 20, 2019December 8, 2019

    Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold your data for ransom, practice espionage, or simply disrupt your business, most hackers cannot access your network without an “in.” In other words, they require a login, personal access codes, or network…

    Read More 5 Crucial Elements to Training Your Employees in Optimal Cyber SecurityContinue

  • Essential List of Cybersecurity Terms to Know in 2019

    Essential List of Cybersecurity Terms to Know in 2019

    April 26, 2019December 8, 2019

    As the digital community continues to expand to include more individuals and more devices, enforcing cybersecurity becomes more complicated. The number of opportunities and vulnerabilities for hackers to leverage is continuously growing; it is imperative for businesses to take proactive measures to protect themselves. With new terms and acronyms constantly emerging to refer to these…

    Read More Essential List of Cybersecurity Terms to Know in 2019Continue

  • Cybersecurity Basics For Small Businesses

    Cybersecurity Basics For Small Businesses

    March 27, 2019December 8, 2019

    Small businesses are at considerable risk of cyberattack. With fewer staff resources available to maintain and monitor networks and fewer defenses in place, small businesses are an attractive target for hackers and other criminals. The risks of a cyberattack are considerable. Companies could spend tens of thousands of dollars just to recover from an attack….

    Read More Cybersecurity Basics For Small BusinessesContinue

  • What Is A Business Continuity Plan?

    What Is A Business Continuity Plan?

    March 18, 2019December 8, 2019

    Creating a business continuity plan is one of the most important things a company can do. Business continuity ensures that your business is back up and running after a critical disruption, such as a natural disaster or cyberattack. What Is Business Continuity? Business continuity is a big-picture approach that ensures normal business operations are continued…

    Read More What Is A Business Continuity Plan?Continue

  • Inside The Anatomy Of The Human Firewall

    Inside The Anatomy Of The Human Firewall

    March 4, 2019December 8, 2019

    Each year, around 61% of small businesses become the victims of a malware attack. While many small businesses may think no one would ever come after them because of their size, know that over half of the total global attacks hit small businesses and, for thieves, getting access to your systems is becoming increasingly lucrative. We’re collecting…

    Read More Inside The Anatomy Of The Human FirewallContinue

  • How Do You Measure Your Company’s Cybersecurity Effectiveness?

    How Do You Measure Your Company’s Cybersecurity Effectiveness?

    February 27, 2019December 8, 2019

    Many companies are finally taking cybersecurity seriously and have implemented programs to meet their organization’s specific needs. Having a program in place, however, is only the first step. Measuring the effectiveness of a cybersecurity plan is equally important. There are several steps a company should take to adequately measure the effectiveness of their plan. How…

    Read More How Do You Measure Your Company’s Cybersecurity Effectiveness?Continue

Page navigation

Previous PagePrevious 1 2 3 Next PageNext

Latest News

  • Best Practices for Secure Data Backup

    These days, everything is digital. We deal with data every day: from personal photos to…

    Read More Best Practices for Secure Data BackupContinue

Company

B1-1002 Beaverbrook Road, Ottawa, ON K2K 1L1

(613) 277-2312

info@digivie.com

Services

Network Security
Secure Business Cloud
Data Protection
Business Telephone Systems
Managed IT

Newsletter Sign Up

Receive email updates and informative marketing materials by subscribing to our newsletter.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Copyright © 2026 DigiVie. All rights reserved.

  • Privacy Policy
  • Home
  • About Us
    • About DigiVie
    • Case Studies
      • Gifford Associates
      • Innovative Financial Group
    • Video Library
    • Testimonials
    • Join Our Team
  • Communicate
    • IP Telephony
      • 911 Service Limitations
    • Business Telephony
    • Web Conferencing
    • Work Remotely
  • Manage IT
    • DigiVie IT
    • inTouch Services
    • inTouch Cybersecurity & Managing Human Risk
    • Internet Properties
    • Cloud Solutions
    • Data Protection
    • Security
    • Network Support
  • Our Blog
  • Contact
    • Contact Us
    • Client Portal
    • inTouch Connect