News & Updates
AI A Poor Man’s Wealth
Dorota Ulkowska
March 27, 2024
Is AI everything that we make it out to be? Is it truly at a state where it can help our business grow? Or is ...
Read More →
CyberSecure Canada Certification
CaSh Wong
August 16, 2023
Shing Digital is excited to announce that we have been officially certified by Innovation, Science and Economic Development Canada for the CyberSecure Canada Certification. CyberSecure ...
Read More →
Industry under attack? Yep, and YOU ARE NEXT!
Trevor Nawalkowski
May 10, 2023
“But I’m small. No one knows I exist. They know they won’t get 2 million dollars from me.” But what about $140,000? The average ransom ...
Read More →
Canadian Legislation for OT Security – Are you in the loop?
CaSh Wong
February 24, 2023
https://www.youtube.com/watch?v=ugP63G-ORgc Canadian legislation for OT security (Bill C-26) is changing and we want to make sure you’re prepared! Together, MICA Controls, Shing Digital, and OPSWAT ...
Read More →
Security Awareness
Lung Wong
September 21, 2022
https://www.youtube.com/watch?v=S9kyN42MynYEven if you have an unlimited IT budget, it is estimated that IT can only protect an organization from 80 to 85% of the threats ...
Read More →
Disaster Recovery and Business Continuity
Lung Wong
September 21, 2022
https://www.youtube.com/watch?v=qDkyWYUXSb8When we think about disaster recovery we think of backups. The problem with backups is that we manage them by exception. So as long as ...
Read More →
Cyber Security Insurance
Lung Wong
September 19, 2022
https://www.youtube.com/watch?v=0f074UAKWI4 Average ransom ware demand is over $200,000 and the average cost of a data breach is $6.35 M. Statistics show us that ¾ of ...
Read More →
Incident Response Plan
Lung Wong
August 11, 2022
https://youtu.be/YXW2X3P051MJust like fire drills, having an incident response is key to prepare for cyber-attacks. They will happen. It is not a matter of if but ...
Read More →
Endpoint Detection and Response
Lung Wong
August 11, 2022
https://youtu.be/IBtI9n74-jUTraditional or legacy anti malware is now outdated. Malware utilizes signatures to stop threats. But now malware can change its own code and therefore traditional ...
Read More →