A cybersecurity audit for SMEs

A cybersecurity audit for SMEs

When a company wants to strengthen its cybersecurity, its service provider often suggests following standards such as ISO 27001 or SOC 2. “It’s not NASA here”, a phrase we often hear when talking about security budgets. And it’s not untrue:...
Pentest: Why, how much, how?

Pentest: Why, how much, how?

It’s a common misconception that only large companies are targeted by hackers. Yet 45% of cyber attacks target small and medium-sized enterprises (SMEs).1. Why? Because they are often less well prepared, with limited or obsolete safety measures. The consequences...
Safeguard rule 3-2-1: An essential strategy

Safeguard rule 3-2-1: An essential strategy

In a world where cyber-attacks and data loss are increasingly common, data protection has become a top priority for businesses. The 3-2-1 backup rule is a simple but effective strategy for ensuring that your data remains accessible even in the event of a breakdown,...
Appoint a manager, create registers and forms

Appoint a manager, create registers and forms

This blog is part of our Loi 25 series, which aims to help companies achieve compliance. With the introduction of Bill 25, Quebec companies must now take concrete steps to protect individuals’ personal information. These new requirements are designed to enhance...