Posted: Tuesday, August 9, 2022

Pen-testing & Vulnerability Scanning: What’s the difference?

Pen-testing & Vulnerability Scanning: What’s the difference?

By : Sentia

https://www.sentia.ca/IT-Solutions/Cyber-SecurityPenetration testing and vulnerability scanning are vital for enhancing an organization’s cybersecurity postures. However, most businesses are confused about differentiating the two services. For example, a vulnerability scanning process looks for existing security weaknesses and vulnerabilities, such as unpatched systems, lacking authentication schemes, misconfigurations, and weak password security, and reports them as potential exposures. On the other hand, a penetration test looks to exploit identified security weaknesses in the organization’s systems and IT network architectures to determine the extent to which an attacker would compromise your assets. Also, a vulnerability scan often utilizes automated software programs and tools, whereas a penetration test is a manual process carried out by a security expert.

Read more »

Number of views (94)

Posted: Thursday, July 28, 2022

Security Awareness Training

Security Awareness Training

What is it and Why is it Important?

By : Sentia

Cybersecurity is a top priority for all organizations today. Still, the rapidly changing security landscape introduces unique challenges that require users and cybersecurity professionals to stay informed and adopt best practices. Security awareness training educates employees, third-party partners, contractors, and other relevant stakeholders concerning the current cyber threats, cybersecurity responsibilities, procedures, and policies. It is a critical program that helps inform the necessary threat prevention measures and assists in complying with industry-standard data privacy and security regulations.

Unfortunately, according to Proofpoint’s 2022 State of the Phish Report, only 25% of companies train their employees for two or more hours annually. Yet, a Verizon Data Breach Investigations Report shows that eight out of ten, approximately 82%, data breaches are due to exploitable human vulnerabilities. In addition, untrained and unaware employees account for the largest number of social engineering attacks, stolen credentials incidents, and phishing scams.

Read more »

Number of views (97)

Posted: Tuesday, June 21, 2022

The State of Global Supply Chain and Cybersecurity

The State of Global Supply Chain and Cybersecurity

Addressing the Growing Challenge of Increased Cyber Threats within Global Supply Chain

By : Sentia

Cybersecurity threats have increased twice in the global supply chain, impacting consumers and enterprises. Supply chain attacks have evolved tremendously in recent years, reaching new levels of frequency and sophistication. Nation-state attackers and cybercrime groups target supply chains to carry out extensive espionage and large-scale extortion cyberattacks. According to Gartner, 45% of companies will likely experience software supply chain attacks by 2025, three times more than in 2020. Therefore, it is critical to understand the top supply chain cybersecurity threats and how you can mitigate them.

Read more »

Number of views (210)

Posted: Monday, June 13, 2022

Mental Health in Motion 2022

Mental Health in Motion 2022

Ride, Walk and Run for Mental Health Awareness

On Sunday June 12, Sentia sponsored and participated in the 2022 Mental Health in Motion Ride, Walk and Run event hosted by the Canadian Mental Health Association of York and Simcoe.

After a long two-year hiatus, we were delighted to be back in-person with other like-minded individuals all in support for a worthy cause. The rain had threatened to put a ‘damper’ on the event (pun intended), but it fortunately held off for the entire duration of the ride, walk and run.

Read more »

Number of views (215)

Posted: Monday, September 13, 2021

Why IBM i Still Matters

Why IBM i Still Matters

Dispelling misconceptions about IBM i/AS400 technologies losing popularity

Undoubtedly, technology has evolved at a rapid pace over the past several decades and continues to do so. But some legacy machines that may be unfairly viewed as obsolete still hold tremendous value in today’s marketplace.

Enter IBM i – a family of mid-range computers that has gone through many name changes during the course of its lifetime.

As the image below illustrates: The evolution of IBM i began in the late 1970’s with the AS/400 (Application System/400) being introduced in 1988 as the successor of the previous two models.

Read more »

Number of views (3380)

Posted: Thursday, November 12, 2020

Top Technology Trends to Look Out for in 2021

Top Technology Trends to Look Out for in 2021

An outlook for the future as businesses continue to adapt to new and uncertain times.

As we inch closer to the end of 2020, we must take a moment to step back and reflect on the roller coaster of a year we have had. Disruption has been at the forefront of 2020 forcing businesses to quickly pivot and adapt to new and unfamiliar forms of normalcy. Unfortunately, the COVID-19 pandemic will not miraculous disappear once the clock strikes midnight on January 1st 2021. This new reality - this digital transformation - is for the long haul.

Read more »

Number of views (2485)

Posted: Friday, January 25, 2019

Why You Should Consider a Managed IT Services Provider

Why You Should Consider a Managed IT Services Provider

Optimize IT Service Delivery Without Breaking the Bank

As technology continues to evolve and with the integration of AI frameworks, the complexity of managing a businesses’ IT infrastructure has significantly increased. Facing this reality, one of the biggest challenges many businesses face is the proper management of their IT environment to ensure smooth and seamless operations.

Read more »

Number of views (153389)

Posted: Monday, January 15, 2018

Rethinking IT to Create New Business Opportunities

Rethinking IT to Create New Business Opportunities

It’s 2018, and with a new year, a new chapter begins. If you’re rethinking your IT department and how it can contribute to opening up new opportunities for your business, I’ve come across a thought-provoking piece from Deloitte’s, The Symphonic Enterprise that I think you will enjoy.

Read more »

Number of views (6421)

Posted: Friday, December 29, 2017

The Year Ahead and a Look at the Latest Technology Trends

The Year Ahead and a Look at the Latest Technology Trends

As is the tradition at Sentia, we like to wrap up the year by looking forward to emerging trends and highlight those that could have a significant impact for our customers moving forward.

From a general perspective, 2017 was a great year for Canada in many ways. Did you know that we were ranked the 2nd in the annual Best Countries” survey from the U.S. News & World Report? The survey evaluated 80 countries in a variety of categories including economic influence, citizenship and quality of life. 

Read more »

Number of views (6926)

Posted: Friday, September 29, 2017

Digital Transformation, IoT Explosion and Enterprise Security Challenges

Digital Transformation, IoT Explosion and Enterprise Security Challenges

By : Anonym

In my recent blog post, I talked about digital transformation and how CIOs are preparing to support this explosion of internet connected devices. The security around these devices is creating a massive challenge.



Read more »

Number of views (20498)

CategoryID: 35