Ruckus Cloudpath: security for wired AND wireless networks

Posted by Marc Therrien_ on Nov 1, 2017 7:45:00 AM

In recent years, IT experts have put a lot of emphasis on the importance of properly securing wireless networks. In fact, while the message has gone over well for wireless, this is far from the case for wired networks as most companies continue to neglect the protection of their LAN network. Companies are unknowingly at increased risk of being attacked or having their sensitive data accessible to anyone with a network connection at their disposal. 


Take for example your residential WiFi access. You most likely need a password to connect to the Internet. However, if you connect your workstation directly to your router, authentication is no longer necessary and you have immediate access to your network. This is exactly the same principle for companies. Remote access to the network is secure, but the wired entry doors within the building are unlocked when companies do not impose some form of authentication before a user can connect to the network.  

Read More

Topics: BYOD, IT infrastructure, IT security

How to prevent ransomware attacks using a test infrastructure

Posted by Francois Desjardins_ on Jun 7, 2017 7:45:00 AM

Ransomware attacks have become an important issue for companies over the last few years. Hackers use this type of malicious software to crypt the data of one or more computers and block companies from accessing their IT system. They then ask a ransom in exchange for the data.


A ransomware is a virus introduced into servers via email, a USB key, or any external component that can access a workstation or server. This can result in serious consequences for companies:

Read More

Topics: BYOD, IT infrastructure, CIO/IT leaders, IT security

Computer security in SMBs: an often neglected daily challenge

Posted by Benoit Mercier_ on Nov 3, 2016 12:00:00 PM

We often associate a computer security breach with the theft or loss of information resulting from the intrusion of computer hackers. Indeed, these much talked about hackers are often the companies’ main worry. Is this fear justified? How do we prevent data theft or leakage? 


Some famous cases

One need only think of the hacking that took place at Ashley Madison last year. Information on members was collected, then disseminated. We learned this year that some 500 million Yahoo! members had the same thing happen to them, not to mention the massive hacking at Sony in 2014. The American company had been threatened at the time by a hacker group that if it did not answer their demands, a lot of secret information and movies would be made public before their release date.

Even more recently, a couple of weeks ago, there was a major DDoS attack which prevented access to important websites such as Paypal, Twitter, Spotify, and even CBC.  

Read More

Topics: BYOD, IT infrastructure, Cloud, Events

Wi-Fi in high-traffic public areas: a revolution is underway

Posted by Claude Gagne_ on Oct 4, 2016 1:15:00 PM

As mobile traffic surpassed wire traffic in the fall of 2014, the infrastructure behind public Wi-Fi is becoming less efficient and more costly to deploy. With an increasing number of mobile devices using Wi-Fi as their main Internet connection and with users choosing Wi-Fi as soon as it is available, the traditional Wi-Fi limits are soon reached. 

The installation and use of a traditional Wi-Fi infrastructure in high mobile traffic areas are hindered by the following limitations:

•  The difficulty of creating an efficient plan to install access points;

•  Overrun channels due to too many users connected to the same access point;

•  An ever-changing mobile access point;

•  The complexity of access point management by the WLAN controller.

For these reasons, the quality of the signal, uncertain to begin with, is greatly affected by interferences.

However, things are changing thanks to new technologies like Smart Wi-Fi.

Read More

Topics: IT Innovation, Mobility, BYOD, IT infrastructure

4 myths about an enterprise mobility strategy busted

Posted by Nicolas Huet_ on May 1, 2015 7:30:00 AM

Mobility in general and the establishment of an enterprise mobility strategy are at the top of business concerns and trends right now. Mobile technology strongly attracts the attention of all users, from the consumer to the professional.

However, the vision of mobility is still restrictive in many companies in Canada, and the use of enterprise mobile solutions is still under-exploited.

An enterprise mobility strategy is as much the responsibility of the leaders in operations, marketing or sales, as it is CIOs.

Read More

Topics: Mobility, BYOD, Events

20 mobility statistics you can’t ignore in 2015

Posted by Jennifer Bridgeman_ on Feb 20, 2015 12:00:00 PM

Mobility has already shifted behaviours in the way we work, shop, spend, consume information and compete in business. The time to act is now for enterprises who haven’t already adopted clearly defined mobile strategies.

The following 20 mobility statistics provide key data on general trends in mobility, enterprise mobility and consumer mobility.

Find what’s relevant for you and enjoy and share the stats!


General mobility statistics


1. Mobile devices in use, including both phones and tablets, will grow from over 7.7 billion in 2014 to over 12.1 billion by 2018. 

Read More

Topics: Mobility, BYOD

The often overlooked benefit of BYOD- employee satisfaction

Posted by Nicolas Huet_ on Oct 3, 2014 12:30:00 PM

In our article Mobile Device Security Is Crucial to Your Business. Learn Why! we focused on the safety challenges companies face when it comes to mobile devices and BYOD. There are also benefits to BYOD that companies often neglect because they are more preccupied with security.

Today, employers that wish to attract and retain the requisite talent, and retain their competitive advantage, will do well to follow the lead of Cisco and focus on employee satisfaction as it relates to BYOD.  A survey conducted by the company showed that its employee satisfaction rating zoomed 33 percent after the implementation of a BYOD program.


Read More

Topics: Mobility, BYOD

4 ways in which enterprise mobility can increase productivity

Posted by present on Sep 30, 2014 8:00:00 AM


Mobile devices have revolutionized business over the last few years and have made both challenges and opportunities at the same time. In an Information Week survey, 82 percent of C-level respondents said they expect smartphones to play a critical role in business productivity whereas only 36 percent considered laptops to be critical. When combined with data accessible through a company network, the Internet, or the cloud, mobile devices mean employees are able to work at any time and from any location.

There are four main ways that mobility can lead to improvements in productivity:


1. Employees Have the Flexibility to Work Away from the Office

Read More

Topics: Mobility, BYOD

About this blog

The right use of technology addresses business challenges and drives business growth in all areas of an enterprise.  We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.

Subscribe to Blog Updates by email

Protecting your business assets: Lower your risks with a disaster recovery plan

Recent Posts