Claude Gagne_

Systems / Cloud Architect. 88% of Canadian CEOs view IT as the primary growth tool to enhance the connected user experience and optimize internal and/or cloud IT infrastructure (17th Annual Global CEO Survey) My role is to: - help clients with their infrastructure and cloud projects - establish with them the IT scenarios most suited to their needs and respective ROI objectives - ensure the proper deployment of the project in coordination with the technical teams. And I am very enthusiastic to do so using the constantly renewed technologies at our disposal. I joined Present in September 2014, but have been working in systems architecture for over 20 years. I have several technical certifications and hold a Master of Economics.

Why does your SMB need cyber insurance?

September 20, 2022

To paraphrase Benjamin Franklin, nothing is more certain than death, taxes and, nowadays, cyberattacks.

Are you ready for Law 25 (aka Bill 64)?

August 24, 2022

Like most businesses, in order to operate, you need to store sensitive personal information such as names, social insurance numbers, credit card..

How to overcome the cybersecurity labor shortage?

July 26, 2022

There is no doubt that an organization that lacks the requisite cybersecurity expertise is the most vulnerable to attacks.  No problem, you might..

Summer: it's time for holidays and cyberattacks!

June 2, 2022

As DJ Jazzy Jeff & the Fresh Prince said:"Summer, summer, summertime. Time to sit back and unwind."           Unfortunately summer holidays are..

Datto SIRIS: The All-In-One Managed Continuity Solution, with Native Immutability

March 24, 2022

For adversaries, it is no longer just a matter of encrypting backups and production data. It's also about stealing your data in order to sell it,..

Multi-Factor Authentication: understand the risks, focus on quick wins, and act as soon as possible

February 17, 2022

Groundhog day "Hackers Don’t Break In, They Log In." Day after day, adversaries connect to their victims' services and applications using means such..

Bill 64: the hare, the tortoise and the ostrich.

January 20, 2022

Companies have until September 22, 2023 to comply with the provisions of Bill 64. Failure to do so could expose themselves to criminal penalties of..

How to recover from a Log4j attack?

December 20, 2021

Many articles explain how to fix the Log4j flaw and mention the saga of security updates provided by Apache. When an adversary is able to exploit..

Cyber Security First - Cyber Security Awareness Month 2021

October 20, 2021

It is less expensive, easier and less risky to protect yourself from a ransomware attack than it is to face the consequences of insufficient..

Nutanix .NEXT 2021 Conference

September 30, 2021

Nutanix kicked off its .NEXT 2021 conference on September 21.fr The virtual event, with the theme "The Cloud on Your Terms", coincides with the..