Upcoming events

Follow Us

Log in

Being Connected

We know the benefits of being connected, nowadays we have an expectation that we will have a connection to the internet as a matter of fact.  We download and use apps on the fly, except terms and conditions of the provider and allow the app to connect to our media files, location, photos, contacts, and file folders.  We must understand that Freedom is a right, but it is also a responsibility.  Our words/data and actions have far more meaning, when we use our electronic devices, we are on a world stage and no longer.  New reality is our data, once we allow applications access is out of our control and we entrust organizations that we have no control or means to exercise any rights over.

The risk we take is not just to ourselves but crosses all boundaries Personal, Organizational and Societal/National, every connection we have is exposed to risks by who you allow access to your data.

  • Access to your private and personal information
  • Fraud – CRA, Email, Phishing, Hacking, Fake Sites,
  • Misleading Information - Fake News, Robocalls, Spam, Social Media
  • Reputational damage – private photos, exposing ill-conceived emails, tweets, posts,
  • National Security – manipulation of elections, spreading false information regarding public officials and government.
  • Confidence in National Institutions – National Security Administrations leaks on public surveillance
  •  63% of ID theft is due to unprofessional use of passwords……....Verizon Breach Report 2016

Analysis of 1 Billion password shows:

  • 20% use identical passwords several times
  • 27% use similar passwords several times
  • At similar services, reuse rises to 50%

Prof. Meinel, Hasso Platter Institute 2019

  • Approximately 31M per Month
  • Many user protect their data with weak predictable passwords
  • 37% use the top of the 1M passwords
  • Use the QR Code to check if your email id is found on the known identity leaks
  • The identity Checker has 9.5B identities from 850 leaks.
  • People aren’t going to change (at least not soon)
  • Educated people of ways to guard their data and your organizations data


Protect your organization by using propitiatory solutions avoid using social media for your organizations business information and communications.

Next time your downloading an App, document, or any material and are aske to give access/provide your personal data or access to your phone think of your data as currency and make a decision of how much you value it and what you are surrendering it for.

The following are some tools and methods you can use to protect you most valuable asset, your data.

Know the Scams

  • Phishing, Spoofing, Pop-up Fraud – types of online fraud used to obtain personal information.
  • Trojan Horse – Virus that can record your keystrokes. It can live in an attachment or be accessed via a link in the email, website or pop-up window.
  • Counterfeit Websites – URLs that forward you to a fraudulent site. To validate a URL, you can type or cut and paste the URL into a new web browser window and if it does not take you to a legitimate web site or you get an error message, it was probably just a cover for a fraudulent web site.
1.                   Activate a pop-up window blocker. There are free programs available online that will block pop-up windows.  Be sure to perform an Internet search for “pop-up blocker” or look at the options provided by major search engines.   You will need to confirm that these programs are from legitimate companies before downloading.   Once you have installed a pop-up blocker, you should determine if it blocks information that you need to view or access.   If this is the case, you should consider turning off the blocker when you are on Web sites you know use pop-up windows to provide information you need or want to view
2.                   Scan your computer for spyware regularly. You can eliminate potentially risky pop-up windows by removing any spyware or adware installed on your computer.   Spyware and adware are programs that look in on your Web viewing activity and potentially relay information to a disreputable source. Perform an Internet search for “spyware” or “adware” to find free spyware removal programs.   As with a pop-up blocker, you will want to be sure that your removal program is not blocking, or removing, wanted items, and if it is, consider turning it off for some websites.
3.                   Avoid downloading programs from unknown sources. Downloads may contain hidden programs that can compromise your computer’s security.  Likewise, email attachments from unknown senders may contain harmful viruses.
4.                   Keep your computer operating system and Internet browser current.
5.                   Keep anti-virus software up-to-date. Anti-virus software needs frequent updates to guard against new viruses.   Select a reputable provider. Download the anti-virus updates as soon as you are notified that a new program update is available or flag your program to download and install the updates automatically if that option is available.
6.                   Keep your passwords secret. Change them regularly, using a mixture of numbers and characters.
True electronic safeguards include that people understand the frauds, how they happen, how it affects you and what tools and solutions are available to assist you.

Vancouver • Calgary • Winnipeg • Toronto • Ottawa • Montreal • Halifax