Key trends and expert insights in cloud, networking, and security
CMN Wire is your essential resource for navigating the digital landscape with confidence. Gain exclusive insights, expert analysis, and stay informed on the latest industry trends in cloud, networking, security, and beyond.
Insights & trends

Cloud Managed Networks Achieves Diamond Partner Status with Verkada
CMN’s rapid ascent to Diamond Partner status means customers gain access to best rates, priority support, and cutting-edge Verkada solutions.

Together We Give: CMN and Umbrella’s Commitment to Support Our Community
At Cloud Managed Network (CMN) and Umbrella, we truly believe in the power of coming together to make a difference. This past holiday season, our team embraced the spirit of generosity through the Holiday Donation Drive, proudly supporting the Richmond Hill Toy Drive.

The MOE’s RA 3.0 and Zscaler
Every year, educators gather at the Bringing IT Together conference to learn what’s going in the tech… and every year we are an event sponsor because education is near and dear to our hearts… which may be why 28 school boards choose to work with Cloud Managed Networks.

Cloud Managed Networks is now a Zscaler partner
We chose to work with this outstanding partner because Zscaler is a leader in cloud security.

Network and Data Security for Returning and Remote Workers + Disaster Recovery Symposium
This Thursday, July 16th, we are holding an online symposium from 10:00 am – 2:00 pm.

Thursday’s Virtual Conference Tackles Today’s Supply Chain Trials and Tribulations
This Thursday, June 25th, supply chain professionals from around the globe will come together to share insights how to tackle some of the toughest challenges faced by supply chain professionals today with a special focus on IT.

Welcome to our new blog.
As you may have noticed, we have a new logo and website! On the site you will find information on trends affecting the industries we serve, as well as the various products and services we offer clients.

The State of Shoplifting report reveals that 75% of retailers experience theft, with 24% of shoppers willing to switch stores following an incident. Explore trends and prevention strategies to create a safer retail environment.
Download

Shoplifting trends shaping retail in 2025
The State of Shoplifting report reveals that 75% of retailers experience theft, with 24% of shoppers willing to switch stores following an incident. Explore trends and prevention strategies to create a safer retail environment.

In 2022, Canada reported 993 workplace fatalities and over 348,000 lost-time injuries across all industries. While these numbers are broad, healthcare workers remain especially vulnerable to workplace violence. The healthcare and social services sector has grown rapidly, prompting more focus on workplace safety.
Download

Workplace Safety in Crisis: Protecting Frontline Workers from Rising Threats
In 2022, Canada reported 993 workplace fatalities and over 348,000 lost-time injuries across all industries. While these numbers are broad, healthcare workers remain especially vulnerable to workplace violence. The healthcare and social services sector has grown rapidly, prompting more focus on workplace safety.

In an increasingly connected industrial landscape, manufacturers are adopting industrial networking solutions to enhance efficiency, security, and innovation. Insights from the Cisco 2024 State of Industrial Networking Report for Manufacturing highlight how operational technology (OT) systems are becoming more digitized, increasing the demand for robust industrial networking infrastructure. Cyber threats, IT/OT collaboration challenges, and AI-driven automation are transforming how manufacturers secure and optimize their networks.
Download

The Role of Industrial Networking in Modern Manufacturing
In an increasingly connected industrial landscape, manufacturers are adopting industrial networking solutions to enhance efficiency, security, and innovation. Insights from the Cisco 2024 State of Industrial Networking Report for Manufacturing highlight how operational technology (OT) systems are becoming more digitized, increasing the demand for robust industrial networking infrastructure. Cyber threats, IT/OT collaboration challenges, and AI-driven automation are transforming how manufacturers secure and optimize their networks.

Shoplifting isn’t just a petty crime—it’s a $5 billion problem in Canada. Thefts are more brazen, often involving violence and weapons. Retailers face mounting losses and operational challenges, while workers and shoppers bear the emotional and financial toll. This issue is reshaping how retail operates, as businesses scramble to balance safety, cost, and customer experience.
Download

New Research Reveals that 24% of Shoppers Switch Stores due to Shoplifting.
Shoplifting isn’t just a petty crime—it’s a $5 billion problem in Canada. Thefts are more brazen, often involving violence and weapons. Retailers face mounting losses and operational challenges, while workers and shoppers bear the emotional and financial toll. This issue is reshaping how retail operates, as businesses scramble to balance safety, cost, and customer experience.

On June 19th, Heather Myers, Enterprise Account Executive, showed Ontario schoolboards how Verkada’s sensors and cameras can be used to combat vaping efficiently, easily and cost effectively.
Download

Verkada and CMN Demo of Verkada Vaping and Security Solutions
On June 19th, Heather Myers, Enterprise Account Executive, showed Ontario schoolboards how Verkada’s sensors and cameras can be used to combat vaping efficiently, easily and cost effectively.

Cyber crime can wreak havoc on your network, business and bottom line. Jane-Michèle Clark of Cloud Managed Networks outlines where the vulnerability lies, and how to ensure the best protection
Download

You’ve got mail
Cyber crime can wreak havoc on your network, business and bottom line. Jane-Michèle Clark of Cloud Managed Networks outlines where the vulnerability lies, and how to ensure the best protection

On May 22, 2021 one of our key partners, Cisco, released a report, based on research conducted, discussing the top challenges faced by IT professionals today. We believe you will find the content of interest, and so have included it here.
Download

New Cisco Research Reveals Collaboration, Cloud and Security are IT’s Top Challenges
On May 22, 2021 one of our key partners, Cisco, released a report, based on research conducted, discussing the top challenges faced by IT professionals today. We believe you will find the content of interest, and so have included it here.
.png)
The only constant is constant change. Business resilience is the ability of an organization to absorb and adapt in a changing environment to enable it to deliver its objectives and to survive and prosper.
Download
.png)
2021 Global Networking Trends Report
The only constant is constant change. Business resilience is the ability of an organization to absorb and adapt in a changing environment to enable it to deliver its objectives and to survive and prosper.

See how Cisco DNA helps this hospital securely connect and manage thousands of network devices and deliver excellence in patient care.
Download

Children's Hospital Los Angeles and Cisco DNA
See how Cisco DNA helps this hospital securely connect and manage thousands of network devices and deliver excellence in patient care.

The Three Shields: How Firewalls Defend Modern Enterprises
The rise of IoT devices and rapid AI adoption has expanded attack surfaces, driving the need for unified endpoint protection. Firewalls are the first line of defense—modern digital gatekeepers securing networks from an increasingly hostile threat landscape. But not all firewalls are the same. Enterprises now rely on three powerful types: the Next-Generation Firewall (NGFW), the Web Application Firewall (WAF), and the Hybrid Mesh Firewall.

How OCWA modernized water infrastructure with Cisco industrial IoT
Modernizing water infrastructure across a large, decentralized network is a growing challenge for public agencies. It requires secure connectivity, real-time compliance, and scalable solutions that can operate in diverse environments. The Ontario Clean Water Agency (OCWA)—Canada’s largest operator of water and wastewater facilities—faced this challenge with urgency and purpose.

Redefining physical security in healthcare: A response to rising violence
Understanding the risk of lacking physical security in the healthcare workplace

Emerging Cyber Threats in 2025: Tactics Redefining Digital Risk
Cybercriminals continue to evolve, adapting faster than many organizations can respond. In 2025, cyber threats are becoming more advanced and deceptive, with tactics once considered fringe now moving mainstream. The landscape of cyber threats 2025 shows attackers targeting not just systems—but also user behavior, overlooked tools, and artificial intelligence.

Why Cybersecurity for SMBs Must Be a Top Priority in 2025
In today’s digital economy, small and medium businesses (SMBs) are increasingly reliant on the Internet for daily operations, customer engagement, and financial transactions.

How to Improve Safety and Security in Schools
The safety and security of students, teachers, and staff in schools across Canada is an urgent concern. Alarming reports emphasize the gravity of the situation: for instance, in Newfoundland and Labrador, over 4,000 violent or aggressive incidents were reported during the 2023 – 2024 school year—a 29% rise from the previous year. Police were called to schools 276 times, highlighting the frequent severity of these events. A national survey further found that four in ten boys have experienced some form of physical assault, and one in five high school boys have faced threats involving weapons. These statistics show the need for robust security in schools and their perimeter areas, both to prevent incidents and to respond effectively when they do occur.

Cybersecurity Threats Haunting Businesses in 2024
Halloween is approaching, and with it, tales of terror that might chill you to the bone. But for businesses today, the real nightmares aren’t in ghost stories—they’re in cybersecurity threats.

Microsegmentation: Protecting Data from Cyber Threats
As cybercrime continues to rise globally, Canada is also experiencing a surge in cyber incidents.

Retail Shoplifting and Loss Prevention: How to Protect Your Business
Shoplifting has become a serious threat to the retail industry. In Canada, retail crime costs $5 billion each year, resulting in higher prices and more incidents of violence toward employees.

Generative AI Cost Optimization Strategies
One of today’s hot buttons is AI. It doesn’t matter if you are a student, retiree, starting your career or holding a C-suite title, how to use AI (or how it is being used in daily transactions) is on everyone’s mind. For companies dipping their toes in the AI well, the question of Cost Optimization is a part of the discussion, too.

Why Do I Need to Protect My Cloud?
Although cloud computing first started the 1960s, it wasn’t until Amazon launched AWS in 2006 that people start talking about the cloud as being something other than white, fluffy wisps in the sky. Even then, companies were slow to adopt the cloud, to some degree because there were insufficient applications available. That is no longer the case and, in part, because the pandemic forced us all to change the way we work, cloud adoption has almost doubled in the past four years.

10 Reasons for Engaging Outside Experts to Manage Your Cybersecurity
Managed Security Services Providers (MSSPs) and MDRs (Manage Detection and Response firms) have multiple clients, so the costs of their technology investments are spread over a broad base, which means you only pay a fraction of the cost it would take for you to have similar technologies in-house. Ditto their team of experts.
.webp)
Why Hiring a 3rd Party MSP Expert Makes Sense and – and Cents (MANY cents!)
There are two main reasons why organisations with less than 1,000 employees and/or without their own IT department are increasingly looking to 3rd party experts to help manage their IT services:

Brand and Network Considerations When Adopting AI Corporately
It’s hard to imagine that the use of Copilot, ChatGPT and other AI tools has become commonplace in only a year, yet it has.

The Trifecta Effect of Integrating XDR, SIEM, and SOAR
Kunal Hatode, Cyber Operations Lead, CX – Security Centre of Excellence, is a Senior Technical Leader specializing in solution integration of Cloud services, Wide Area Network and Cyber Security with Cisco. On July 10, 2024, he wrote:

3-2-1 –Go? Not so quick, this time
For years, 3-2-1 was the standard for data back-up. Based on photographer Peter Krogh’s process for reducing the likelihood of losing his work, the IT community adopted the approach. For IT, the 3-2-1 rule means that you keep:

5 Things a CISO Should Know
For what seems like forever now, we have been hearing that email is the number one way in which cybercriminals gain access to private networks. The oft-quoted stat is that 99% of threat vectors worm their way in through phishing and social engineering.

10-Step Patch Management Checklist
If you’re in IT, and even if you’re not, you already know it’s critical that your networks and endpoints be protected from cyberthreats.

Penetration Testing vs. Breach Attack Simulation
It has been nearly three years since we wrote about the importance of pen testing. Although that information is still good, Cisco’s Jason Maynard, Senior Consulting Systems Engineer Cybersecurity Global Security, presented a paper on the topic at the recent Vancouver International Security and Privacy Summit.

Downtime Costs Escalating as Quickly as Security Breaches
Once again, headlines are filling with news about major breaches. From today’s Ticketmaster disclosure to stale telecommunications confessions, there’s no shortage of security breach stories. The real headline, however, is in the escalating costs, which we’ll discuss momentarily.

Smart Infrastructure Gets Lit Up!
As you drive through Any town in North America, you may notice the number of different streetlights that illuminate the roads that you are traveling. Some are tall to cover large areas while others may be more decorative and located in downtown areas to give the town a unique character. Whatever they look like, municipalities large and small are starting to realize the true value of these structures.

Securing Industrial IoT: The Missing Puzzle Piece
When industrial organizations connect their operational environment to the network as part of their IoT initiatives, their technology landscape grows. However, much like a puzzle, organizations often find there’s a missing piece that’s preventing anyone from seeing the full picture of this new landscape. Without that missing piece, the entire landscape is at risk.
.png)
7 Common Cybersecurity Mistakes Made by SMBs
One of our partners, Cisco, recently published a blog post that sums up many of the things we’ve been saying about cybersecurity. So, with permission, here is the blog post written by Cisco’s Ian Thompson:

The Future of Physical Security: Cloud-Based Systems
Verkada, one of our valued partners, recently sponsored a Harris Poll research study to look at how leaders responsible for physical security are making decisions, as the industry transitions from on-premises solutions to cloud-based ones.
%20(1).png)
Autonomous and Sensor Technology Use Surging
To say we’re living in exciting technological times, would be an understatement. AI, 5G, ML, IoT, AR, VR – acronyms that have been transported from the pages of fantasy novels to reality at our fingertips. They also represent technologies that work together well, and are being leveraged by young and old to reshape how we think about almost all products and services today.

2024 Facilities Trends Will Require Facilities and IT Teams to Work in Tandem
We’ve attended a few conferences recently and heard a common refrain: Life would be easier if the IT and Facilities teams could collaborate more often and/or earlier in the process.
.png)
NGFW vs. WAF. What’s the Right Firewall for You?
It’s not exactly news to say that AI, ML and increasingly sophisticated cybercriminals because the frequency of cyberattacks and effectiveness of threat vectors to increase multi-fold over the past 12 months. It is also common knowledge that AWS users are prime targets.

Chris Hadfield’s Words To Live By
Last week, while attending an IT conference for educators and school board officials, we had the pleasure of hearing from Chris Hadfield, the first astronaut to operate the Canadarm, and the first Canadian to walk in space (1995).

Industrial Revolution 4.0 + IIoT
We are living in a world where customers expect, and are demanding, products that reflect, and are capable of being customized, to their personal and individual corporate needs. The expectation today, is that devices can also be remotely controlled with mobile devices, and that data is fed in real time to these same devices.

Empowering Future Generations for a Secure Digital Future
For a long time, leaders have known that Digital Fluency is essential for innovation, and that the two are actually drivers of each other. As technology improves, more organisations adopt applications and other solutions to help facilitate the day-to-day, which drives demand for enhanced or new digital capabilities.

Your Cloud Needs Protecting, Too
Cloud Migration entering its 2.0 phase at a time when cybercrime is at an all time high, and the vector villains have become extremely sophisticated and well-organised.

Your building alarm systems could become obsolete. In 2024!
In 2020, an alarm scoring system was introduced to help law enforcement agencies prioritize calls, because the vast majority of alarm signals in North American were proving to be false alarms… or “operator error”. Wrong codes punched in by bona fide employees, low battery signals that weren’t addressed in a timely manner, and other mistakes that prompted patrol cars and other emergency vehicles to be dispatched unnecessarily.
.webp)
Zero Trust 2.0: Zero Trust Data Resilience (ZTDR)
In previous blog posts, we’ve talked about Zero Trust, the need to back-up data in multiple ways at multiple locations, the need to regularly assess your security posture and – because Murphy’s Law applies all too frequently – the importance of breach preparedness.

We just got, or got used to, Wi-Fi 6. What is Wi-Fi 7?
It has been nearly three years since the government announced that the 6GHz band to support more users and give Canadians access to higher speeds (in gigabits per second) for wireless devices connected to Wi-Fi routers.* The decision allowed an additional 1200 MHz of spectrum, tripling the spectrum available for Wi-Fi.

What Does the Board Need to Know? Business Metrics that CISOs Should Share – 4th and Last in a Four-Part Series
In this final installment of key data that CISOs should consider sharing with the companies Board members and senior decision-makers who are not part of the IT team, we’ll be covering Infrastructure and New Technologies.

Why 2024 is the Year for AI Networking
Every blog post, news headline, business discussion – even my friend’s 10-year old daughter raised the topic when asking me for help with her homework on the weekend!

International Women’s Day is Tomorrow – Great Time to Think About...
I didn’t complete the blog post title because research shows that over 60% of North Americans will not read articles that talk about Diversity, Equity and Inclusion (DEI). Whether you are person who sighs when the conversation turns to DEI, or rejoices, you might find the following short read of interest. You may also get a chuckle out of the shoe analogy at the end.

Data-Centric Security Step One: Classifying Your Data
If you’re reading this post, you, more than most, are all-too-aware of cybersecurity risks and the challenges associated with protecting your cloud, network, data, endpoints and users.

The Network – Unsung Hero of Super Bowl LVIII
Superbowl Sunday. A day of super snacks, epic parties, great commercials and a heavily-hyped half-time show. Oh yeah, and a little football with dreams being dashed or realized in the end zones.

What Does the Board Need to Know? Business Metrics that CISOs Should Share – Third in a Four-Part Series
In this third installment of key data that CISOs should consider sharing with the companies Board members and senior decision-makers who are not part of the IT team, we’ll be covering Infrastructure and New Technologies.

Boosting IT Team Performance by Fostering Intuition, Curiosity and Creativity
Have you ever had an immediate reaction to someone you just met? Perhaps it was a new business colleague and, for no reason at all, you simply didn’t trust them? You did not like them despite everybody singing that person’s praises? Fast-forward to learn that the person has been fired for stealing other people’s ideas.

Breach Remediation Costs Can Wipeout Bottom Line and Business
As of August 2023, cyber attack was occurring every 26 seconds globally. According to the FBI and Interpol, approximately 33 billion accounts will be breached by the end of 2023. That’s about 97 cybercrime victims being created each and every hour!

Hoodied Hackers Now Favour Hugo Boss
In our November 12th blog posts on Cyberbreach Remediation Costs, we said that in over 90% of corporate breaches, employee and client personal data is also stolen.

What Do You Need to Tell the Board? Business Metrics that CISOs Should Share – Second in a Four-Part Series
If you are in the role, you know that part of a CISO’s role is to share key data with their Boards and/or seniors executives who help determine how tightly the purse strings should be drawn. In our December 20th post, the first in this four-part series, we separated these many elements into 10 Key Categories:

How to Get People to Re-Engage After the Holidays
Please don’t be intimidated by what appears to be a long post. There is a certain amount of humour in here that will get you through the 3 – 4-minute read.

What Does the Board Need to Know? Business Metrics that CISOs Should Share – First in a Four-Part Series
It’s that time of year again – no not time to break out the eggnog for the last week celebrations before you break for the holidays. It’s “break out in sweat” time, as you plan what to present to The Board for the perennial, beginning of the year, “Let’s Take Stock” session.

Android Devices MUST be Updated + IT Departments Being Cut as Privilege Escalation Escalates
Today’s post is short, but not so sweet.

Today’s Common Cloud Migration and Management Concerns
We now live in a world where cloud usage is the norm. No wonder: Globally, companies report it reduces downtime by 55 – 60% , and makes IT operations and management easier, while improving productivity as much as 38%.

Protect Your Healthcare Network from Cyberattack – Lives are at Stake
As you know from our other posts, and from the video we created for the United Nation’s General Assembly this past September, we talked about how the loss of critical services for hospitals and infrastructure providers can be life-and-death – literally.

Happy Halloween: Black Cats Lead to Boo....Hoo.
The ghostly night that ghouls relish is now upon us. Goblins will gobble up tasty treats. Little kids will scamper in the streets. Teens will jump out of the bushes yelling, “Boo!”, while black cats cross your path. It has been a spooky month, indeed.

Insurance Underwriters are Protecting Their Flanks
In the first half of 2023, nearly 25% of cyberinsurance policies were not renewed – or not automatically. In many cases, policyholders had to make significant changes to their software, policies and procedures before the company could be covered.

Insurance Companies Cracking Down as Cybercriminals Become Better Business Builders
10 years ago, cybersecurity was not a commonly-used phrase, even within IT departments. Today, the term is not only well-known, but a major concern for organisations of all sizes, in every sector, in every country around the world.

Scary Cyberattacks Stats
This blog post won’t give you solutions but, rather, is intended to shine a light on scary stuff happening in cyberspace right now, for those of you who need a little ammunition for upcoming budget planning sessions.

Parents, Profs and IT Professionals Perceive Back-to-School Through Different Lens
Whether they have toddlers or teens, parents totally understand why a major retailer used, “It’s the most wonderful time of the year” song lyrics to describe back-to-school.

Zscaler’s new IDTR and other tools that leverage generative AI
Last month, IT blogs were abuzz with news from Zscaler Zenith Live 2023, which was hosted in both Las Vegas and Berlin this past June. The annual conference brings together cybersecurity experts, industry disruptors, partners, clients and a lot of the IT Who’s Who from around the globe.

Vanquish Vaping, Vandalism and Villainy
Vaping, vandalism and villainy have become growing concerns for many organisations. Here are a couple of examples, and a couple of potential solutions that will help more than simple signs.

Fabric for Fast-Paced Environments
It seems as though just about every article you read about business today mentions the “fast-paced” environment in which we work. That’s not new.

Changes to Cyber Insurance Requirements - What you Need to Know
More changes? If you’re like most people, seeing changes to what’s covered, along with the cost of your current cyber insurance policy, you may be wondering if it’s worth the cost. It is, of course, but that doesn’t make the budget hit any less painful.

Cybersecurity Readiness – Newly Released Report
You don’t need me to tell you why it’s critical that your networks and endpoints be protected from cyberthreats, or for me to share yet another scary stat related to cyberattacks.

Passwords Leaked...Again
Once again, headlines are screaming about data breaches that hit close to home.

10-Step Patch Management Checklist
As you likely know already, having a strong patch management system will not only ensure you have the most recent updates for your operating systems and all the applications running on them, but will help you roll out new software and/or features effectively (and only to the users who need the upgrade), fix bugs, and greatly reduce security vulnerabilities.

Remote – Again – For Now… and Still Maintaining Engagement
We don’t need to tell you that the pandemic permanently reshaped how we think about work – and that people’s work habits and technology have been keeping up to support this new reality. That being said, Cisco’s research has revealed that some of the challenges faced by educators are the same as those experienced in the public sector.

Protecting Pocketbooks, Passwords and Property from Pilfering
It’s that most wonderful time of the year, when hearts and wallets open wide… and when scammers, cybercrooks and other bad actors work overtime to earn coal for their stockings.

Sensor-Driven IoT Innovation in Superstructures, Shopping, Space, Soil and…
To quote Ripley, believe it or not, sensors have been a part of our lives for almost a century and a half. Ever since the first thermostat was invented in the 1880s, we’ve been relying on sensors to detect and help us respond to changes in our environment.
.png)
Raspberry Robin: Highly Evasive Worm Spreads over External Disks
As you know from our other blog posts and regular newsletters, cybersecurity is one of our expertise areas. We regularly research trends related to malware, ransomware and other malicious code. We also work with best-in-class cybersecurity solutions providers to obtain up-to-the-minute threat vector data.

Cisco Introduces Responsible AI – Enhancing Technology, Transparency and Customer Trust
At a time when organisations are rapidly incorporating Artificial Intelligence (AI) into manufacturing, processes, and customer interactions, it’s not surprising that corporate leaders listed “improper use of AI” among the top 10 concerns for digital transformation in 2022.

Managing Customer Trust in Uncertain Supply Chain Conditions
We are very fortunate to work with many great clients. One of these is OVO (October’s Very Own). Darren Hallsworth, from OVO, is an expert on managing people and supply chain matters. He has 25 years of leadership experience in Supply Chain, Technology, Inventory, Finance and Planning Management, so when he offered to be a guest writer, we jumped at the chance, as we are helping a lot of clients grapple with this and related issues.

Hope on the Horizon
It’s the beginning of a new year, and yet so many people feel like the old one just won’t end. Yet hope may be the one thing that will get us through. There are many research papers and articles suggesting that hope not only makes us feel better, but helps us manage stress and cope better with adversity.

Toys of Tomorrow… What will spark your imagination? Fuel your imagination?
The CTO from one of our partners, Extreme Networks, wrote a wonderful post about the toys of tomorrow. As Extreme Networks has graciously said we can use any of their material anytime (you will find them equally wonderful to work with if you go down that road), I’d like to share it with you here.
.png)
Protecting Purses and Digital Wallets
It’s that most wonderful time of the year, when hearts and wallets open wide… and when scammers, cybercrooks and other bad actors work overtime to earn coal for their stockings.

The Password that Felled the Kingdom + MFA vs 2FA
Every year around this time, NordPass, one of several password vault providers, releases the top 200 most common passwords of the year. When I checked the full list, I was pleased to see that none of mine were there – but was surprised to see words like “chocolate”, “princess” and “baseball”.

7 Critical Reasons for MS Office 365 Backup
We love this article by one of our partners, HostedBizz, talking about why businesses need to protect 0365 Data, so arranged to share it with you. HostedBizz specializes in helping companies migrate from on premises systems to the cloud – and there is nothing they haven’t encountered and resolved in the many years they’ve been doing it (and that migration has been going on longer than you might imagine!).

Penetration Testing Important, but…
Cybersecurity is something we write a lot about because it is a huge concern for organisations of all sizes and types. One small piece of malware has potential to take down an entire network – even if it only takes seconds for the trojan, worm, virus or other “nasty” to be detected and remediated.

Social Engineering and Poor Patching Responsible for Over 90% of Cybersecurity Problems
Now that we’re fully in the “September Back to Swing of Things”, maintaining your network security may be a bigger challenge than normal. Why?

Breach Incidence and Costs On the Rise Again + 5 Ways to Reduce Your Risk
In our last post we talked about how rising numbers of breaches and increased cost per breach are prompting insurance companies to change requirements to qualify for cyberinsurance coverage.

Cybersecurity Insurance Policies Require Security Audits and Pen Testing
Costs related to cyber security breaches rose 10 – 15% in 2020, depending on whose research you read (more on this in our next blog post). As a result, insurance companies in Canada, the US and further afield are re-thinking their cyber security insurance polices – and the requirements to qualify for coverage. Not to mention how they’re paying out claims – or not.

Wireless strategies for business continuity gain importance as enterprise expand IoT, cloud, and other technologies
Today, we depend on being able to access the Internet matter where we are, no matter what kind of device we’re using. One of our partners, Cradlepoint, helps makes this possible.

How Cybercrooks are Targeting YOU
I feel like there should be a warning content on the video we‘re sharing with you this week. What you will hear from the cyber crook is chilling. Sobering. Down right scary, for some.

Enabling Digital Transformation with Cisco SD-WAN
7-minute read, including linked content

WFH Post Pandemic – What It Will Look Like. What You’ll Need.
The past 18 months or so have been a roller coaster ride – the kind where you get hit with the fall out from the person who pukes every time there’s a dip.

Leaders to looking to the IoT to improve efficiency and resiliency
In today’s world, data governs all aspects of business decision making, helping to improve operational efficiency and productivity across organizations. The implications of the pandemic are driving organization leaders to look to the Internet of Things (IoT) to improve not just efficiency, but also resiliency.

Cyber Security Vernacular – Well, some of it, for now
If you’re relatively new to cybersecurity – and even if the relentless cybercriminal attacks of the past 18 months have made you feel like a seasoned pro – there are relatively new terms being used, sometimes interchangeably.

Why You Need Disaster Recovery, NOT Just Back-Ups
Tired of reading something you already know? Namely that your data and systems are vulnerable to outside attack? Totally get that. We’re going to talk about why you need disaster recovery systems in a moment, but first let’s consider there are five other key reasons why your network might crash:

10 Reasons Why Having an Expert Manage Your Cybersecurity Makes Sense and Saves Dollars
Unfortunately, long gone are the days when IT professionals could rely on firewalls to protect their network. Equally unfortunate, as we’ve all heard over and over – and indeed we have said repeatedly – professionals and laymen alike all know that “it’s no longer a matter of ‘if’ but ‘when’ you will get hacked/breached”.

Converting CapEx IT Investments into Manageable OpEx
We all experienced the sales declines that characterized 2020; it was a year in which gardening tools, cooking “toys”, home gym equipment and electronics with the only categories in which there was real growth. According to Gartner, despite last year’s IT spending decline, 2021 is expected to see increases of 6 – 7% or more.

The Hybrid Workplace – Planning the Next Phase
Like so many Canadian companies, your employees are once again working from home, just as you were considering the options that vaccines could make possible. The silver lining is that it’s easier to make facility and network changes when there are fewer people around.

Cisco Cloud Calling: Empowering Customers to Thrive with Hybrid Work
As I mentioned in my previous blog, the world of work has changed, and many organizations are quickly embracing modern collaboration technology and hybrid work models to thrive. The great news is that Cisco has been preparing for this moment even prior to the pandemic. We have been building for the future of work by leveraging our strength across hardware, software, security and networking. We have also been rapidly innovating with our AI capabilities, so we can empower employees to work smarter and to be more productive from anywhere.

When You Can’t Access the Cloud
We all welcome a bright sunny day when there’s not a cloud in the sky. We love those days, but when the equivalent happens with cyber clouds, it’s a different story.
.png)
How to Keep On Keeping On
We’ve talked a lot lately about the need for data backup and the importance of having disaster recovery plans in place in case your network goes down for any reason.

Threats from Within on the Rise
In 2013, CIA operative Edward Snowden made headlines by exposing classified documents. The world was aghast. We were shocked to learn that an insider had betrayed us.

Cloud Covered? If Not, Take Cover!
Over the past 18 months, there has been a dramatic escalation of businesses moving applications and data to the cloud. Indeed, the number of cloud-based applications used by the average organization increase by 20% in 2020, and cloud activity now represents over 50% of secure web gateway traffic.

Zero Trust and Forrester Wave Report
Traditionally, it was assumed that everything within the corporate network (the IT network, that is) could be trusted – that applications and data would be free from malicious code of any kind. Today, there are several factors which compromise trust:

Password Based Cyber Attack: Like Leaving Keys Under Doormats
You’ve installed a state-of-the-art security in your home, yet keep a key under the front mat and a Post-it in the planter with the alarm code. Yet you wonder how the crooks got in.
.webp)
So, What’s Up With Sensors?
As of January 2021, there were over 8 million sensor patents, with most of the new filings in the areas of automotive, consumer electronics and industrial, including manufacturing, logistics and IoT.

So, What’s Up With Sensors?
Smart sensors are helping to improve supply chain management by providing leaders with real-time data about raw materials, production processes, inventory levels and distribution. As part of the distribution portion, logistics are coming under scrutiny because of the tremendous impact this has on both profitability and repeat sales.

Scanners Provide Peace of Mind for Returning Students and Workers
Your “good news and bad news”: Students and staff will be returning to classroom soon. For you, and for them, it’s a mixed blessing.

Sensors Improve Operations and Bottom Line… Easily and Cost-Affordably.
According to a recent report by Deloitte, “The global smart sensor market is growing at a 19 percent annual rate and is expected to reach $60B by 2022.4” ~ www2.deloitte.co.

Cisco Meraki Looks at 2021
To say that 2020 was a difficult year is an understatement. As we all know, all too well, the pandemic forced businesses to scramble to implement solutions for remote or distanced working. In some cases, strategies and technologies slated for future implementation were ushered in far ahead of time – sometimes without the necessary preparation.

2020 Holiday Shopping: Cybersecurity and Other Tips to Safeguard Wallets and Systems
It’s that most wonderful time of the year, when hearts and wallets open wide. It’s also a year, thanks to the pandemic, in which many of us – including employees – are shopping while Home for the Holidays. Unfortunately, scammers are well aware of this and phishing like crazy.

How to make the most of the technology you have
How to make the most of the technology you have
Why follow CMN insights?
Expert-driven content
Insights crafted by industry specialists, IT strategists, and security professionals with deep expertise.
Actionable strategies
Practical recommendations to effectively implement the latest technologies.
Stay future-ready
Regularly updated insights to keep you informed about emerging trends and innovative solutions.