Cloud Security

The Evolution of Cybersecurity: The Risks of Working from Home – A Zero Trust Approach (Part 4)

Whether it be improved flexibility or improved productivity, working remotely entails a variety of added benefits. However, there are cybersecurity risks which accompany these benefits. This entry in The Evolution of Cybersecurity series will detail what the risks associated with working from home are, the threats cybercriminals employ, and how a zero trust approach can help in their mitigation.

Read More…
Cloud Security

The Evolution of Cybersecurity: Multi-Factor Authentication (Part 3)

When you’re logging in to an account, whether it be for work, entertainment, social media, or so on, multi-factor authentication means that one single authentication factor isn’t sufficient to gain access. The term “multi”, in multi-factor authentication, suggests that at least two or more authentication factors are required to log in successfully. Here are the possible forms of authentication factors:

Read More…
Cloud Security

The Evolution of Cybersecurity: Ideal Endpoint Protection (Part 2)

The first part of The Evolution of Cybersecurity series, titled What Poor Endpoint Protection Entails, covered why antivirus (AV) software should not be relied upon for endpoint protection. In fact, the senior vice president for information from Symantec claims that the majority of attacks go undetected by traditional AV. The first takeaway is that common forms of AV are ineffective against encryption. The AV doesn’t have the key to access the file, and as such, it may not be analyzed, leaving the system vulnerable. The second takeaway is that AV must be configured independently for each unique device, including fax machines and printers. This may require significant manual labour if the devices are not linked, and automatically updated, via the cloud. Therefore, it can be costly and is often neglected.Read More…

Cloud Security

The Evolution of Cybersecurity: What Poor Endpoint Protection Entails (Part 1)

Considering March is fraud prevention month, it brings with it a wake-up call for businesses to evaluate their cybersecurity practices. The statistics confirm that this should be of your concern.  With a 600% increase since the pandemic, the cost of cybercrime is estimated to be around 1% of global GDP. Canada is no exception—nearly 60 percent of Canadian organizations were targeted by ransomware attacks in 2022, costing Canadian organizations $5.6 million USD.

Read More…

Cloud Hosting

Why Cloud Support Shouldn’t Be Overlooked

When something goes wrong—whether it be human error, software or hardware failure, or even criminal activity—this hinders productivity. All of the people affected by this issue then rely on the assistance of someone who holds the expertise to offer a solution. Of course, this situation varies greatly by how widespread the catastrophe is, but regardless, the most valuable asset immediately becomes the cloud support team who is equipped to fix the issue. In these instances, it doesn’t matter how educated, or skilled, your employees are at performing their job. The only way productivity is going to get back on track is through the doing of your designated IT professionals. It is here where overlooking cloud support can make all the difference. If you don’t have cloud support ready to repair the ship (that is cloud hosted infrastructure), then it will sink at sea.Read More…

Case Studies

CASE STUDY: Peer Support South East Ontario (PSSEO)

“Cloud Metric has been a perfect extension to our IT department, and have delivered precisely what we needed. They are all in, sleeves pulled up, ready to take on any challenge or opportunity as they present themselves.”
– Todd Buchanan – Peer Support Centre Manager

Read More…
Cloud Hosting

Cloud 101: Understanding The Essentials

An array of interconnected computers which form a network and provide system resources on-demand such as data storage and computing power is known as cloud hosted infrastructure. The term “cloud” was coined around the late twentieth century with the emergence of the internet. It is essentially a metaphor for storing data redundantly, in the sense that the data isn’t linked to any location in particular but instead resides in the overarching connections between computers, or in other words the “cloud”.

Read More…
Cloud Security

Why Cloud Security Makes All The Difference

Every year, cybercrime in Canada causes $3 billion in losses. Unfortunately, the fact that  cybercrime is a common issue deters some newcomers away from embracing the utility the cloud has to offer. The cloud’s constant evolution and enabling features makes it a staple in the modern tech industry. The cybercrime numbers don’t lie, but neither do the cloud professionals. The experts are here to explain that with proper cloud security and protection consumers and businesses can take full advantage of the cloud with complete ease of mind.

Read More…