Media

Welcome to our media repository Check back often as our library is expanding weekly. 

Blogs

From the boardroom to the cloud. Topics on all aspects of Security. 

Cybersecurity – The Cost of Procrastination

Cybersecurity – The Cost of Procrastination Did you know, your procrastination could cost you more than security would? The price tag for indecision, is very costly, yet many remain complacent when it comes to security. Over

Read More »

Videos

Products & Services, Webinars, Security Advice   

Podcasts

Discussions focused on practical and actionable security information usable by everyone     

In this episode, we talk to Mr. Stuart Smith of Keyworks.ca. Stuart shares his knowledge about security compliance, from its origins to its role in today's connected world. He answers the questions you've been thinking about. Listen and learn about what's involved in embarking on a compliance project. You may save both time and money and a few headaches along the way.
In this episode we speak to the CEO of a well respected and established MSP (Managed Service Provider) about the does and don'ts on choosing an MSP. We unpack it all in this episode and it is a must listen for any company considering trusting a MSP with their IT. If you already have one, you'll learn how to confirm that your getting the service your paying for.
In this episode of Eye on Security, SecuSolutions CEO Jim Kootnekoff is joined by Michael Welch who is the Managing Director, Strategy & Risk at MorganFranklin Consulting, Chicago Illinois. The topic of this podcast is Identifying the Corporate Crown Jewels. In this episode, we will be discussing how to create a security budget. We will talk about where to start, how much to spend, and what to spend it on. We will also discussing outsourcing security,  should you, or should you not. If your facing the challenge of creating a security budget, this podcast is a must listen.
In this episode you will learn what a Phishing Simulation is, what are the crucial elements you need to get the results your after. You will also learn what the advantages and disadvantages are to a covert or an overt campaign are. You will understand why Phishing simulations are important to all organizations.