featured

Cogeco Peer 1 Renews Its Privacy Shield Certification

  With the EU General Data Protection Guidelines (GDPR) coming into force in May 2018, Cogeco Peer 1 is pleased to announce that we have renewed our certification under the EU-US Privacy Shield Program and are publicly committed to complying with its requirements. This certification enables us to legally transfer personal data from the European Union to the United States while meeting EU data protection requirements. Read our privacy policy here: https://www.cogecopeer1.com/legal/privacy-policy/ The European Commission introduced the EU-US Privacy Shield Framework in August 2016 to address the changing needs of data management and privacy, replacing the previous Safe Harbor Principles which had been deemed no longer robust enough. The Privacy Shield Principles comprise a set of seven commonly recognized privacy principles combined with 16 equally binding supplemental principles, which explain and augment the first seven. Collectively, these 23 Privacy Shield Principles lay out a set of requirements governing participating organizations’ use and treatment of personal data…

Read More
No matter what form, disruption is coming for you in 2018

With the New Year here, we are all being inundated with hot takes on what happened in 2017 and what we can all expect from the technology industry in 2018. A quick look at some of these lists brings up a few familiar themes: artificial intelligence, cyber security, blockchain, machine learning, mobility, cloud computing. These are the trends that are going to be disrupting industries across the spectrum in 2018. Depending on which column you read, these technologies are either going to completely upend your business right now, or they’re not something to be worried about for a few years. But the bottom line is, whether you think it’s going to be one year or five years from now, your company is going to face disruption. It’s coming for you. Maybe you’re already seeing it, maybe you’ve planned for what you thought was coming. But even if you’re not sure…

Read More
Security vulnerabilities affecting Intel, ARM and AMD processors

Cogeco Peer 1 is aware of the industry wide vulnerabilities affecting certain Intel, AMD and ARM processors. As a Hosting and Managed Services company, Cogeco Peer 1 houses many customer solutions ranging from colocation to managed infrastructure. Our engineering and security teams are working with key vendors to ensure our internal and customer environments are fully protected. We will provide communication to impacted customers and seek to minimize any impact as updates and patches are applied or made available. Our priority is to ensure that all our customer environments are secure and protected from the potential risks of this vulnerability.

Read More
A Look Ahead in IT: Innovation, Trends, and Threats in 2018

As 2017 comes to an end, tech firms are jumping ahead, opening their ears and minds to what is to come in the following twelve months. A year ago, the rage was augmented reality and digital twins. Hackers were still a big concern, and it was projected that they were going to continue doing what they do best; however, the magnitude of their work such as the Equifax breach and vote tampering surprised even the most pessimistic forecasters. 2018 will undoubtedly challenge, surprise, and bring about new innovations in the IT industry, but what can we expect in the next year? The New Look of Big Data: Intelligent & Connected One of the most significant developments for the coming year will be the evolution of blockchain, as Forrester predicts 30% of proofs of concept will pick up the pace for blockchain for the companies that are able to consider its…

Read More
The Future of Women in STEM According to Jaime Leverton

Title: The Future of Women in STEM According to Jaime Leverton On November 29th, our very own Jaime Leverton, VP & GM Canada and APAC, was featured as a speaker at the Information Technology Association of Canada’s (ITAC) Women in Leadership session. Created in in partnership with Canadian Women in Communications and Technology (WCT), this speaker series was designed to showcase successful female role models from the technology world as thought leaders, to help encourage more women to seek our leadership roles. As someone who has been a driving force behind moving the needle on female participation and leadership in the ICT industry, Jaime was a natural choice. Below are highlights of Jaime’s discussion with Mary Whittle, Chair of ITAC’s Diversity Committee, which touch on her role as a transformational leader in an ever-changing environment, and how she handles her position in an industry that is lagging in female leadership….

Read More
To Keep up with the Pace, IT Becomes Accommodating with Hybrid Solutions

Every business, big or small, mature or a start-up, is faced with the challenge of making the best IT decisions for their company. These decisions are no longer limited to the internal IT department, but they involve and impact the entire firm throughout their interactions internally and with customers. To add to this pressure is the fact that technology evolves at a precipitous pace, and keeping up can at times be overwhelming.   To choose the right IT solution, a business must first define themselves and their needs. However, finding the technology that fits with this definition is often difficult. That is where hybrid IT comes in, balances out the equation, and allows the comparison of different options.  Hybrid IT combines at least two various technologies from a variety of choices, such as cloud, managed hosting and services, and on-premise selections, to offer a continuous and powerful solution. Instead of…

Read More
Is data protection already in your business’ contingency plan?

Natural disasters can abruptly threaten our comfort, stability and even lives. Fortunately, their impact can be lessened with a solid and all-inclusive contingency plan—and not just for families, but businesses as well. Latin American companies, for example, must be aware that Costa Rica, Nicaragua, Guatemala and El Salvador are among the countries most in risk of natural disasters. Also, given that many Latin American countries have an Atlantic and/or Pacific coast, they should also note that 2017 has seen more hurricanes of higher intensity than the average. This begs the question: When a natural disaster strikes, is your business’ contingency plan up to par? Of course, the basics of your contingency plan will include communicating to employees and customers about the natural disaster and ensuring their safety and well-being, as well as protecting the infrastructure of your building. But is data being prioritized too? While it may not be the…

Read More
The Evolving State of Cloud Security

Businesses around the world are eager to jumpstart their digital transformation and journey to the cloud – ultimately improving operational agility, but the transition can be risky if security practices are not taken into consideration. The U.S. National Cyber Security Alliance estimates that six months after suffering a cyberattack, 60 percent of companies go under. Add to this, the Ponemon Institute states, the average price for small businesses to clean up after their businesses have been hacked stands at $690,000; and, for middle market companies, it’s over $1 million. According to Alert Logic’s 2017 Cloud Security Report, hybrid cloud implementations have a 141% higher rate of security incidents than a pure public cloud environment. Let that settle in for a moment…it may seem like a surprising deviance, but as reported by our cloud security partner’s data source of 3,800+ customers. It is one of the many discoveries from their most…

Read More
What’s the Answer to Password Overload?

As we close out National Cyber Security Awareness Month, one of things that continues to be top of mind and one of the tools we need to stay safe online is the password. How many passwords do you use (and therefore have to remember) on a daily basis? Two? Five? More than 10? If you’re anything like me then it’s a lot. And while password managers are better today than they’ve ever been – more secure, more intuitive, more flexible – the password situation across all of our software applications, hardware devices, social networks, etc. isn’t ideal for data protection. Of course, the need for strong passwords is unquestionable. We’re living in an age where phishing, social engineering, and brute force DDoS attacks are commonplace. Cybercrime is no longer something that affects other people, but rather a concern we have all come to realize. Last year alone, cybercrime cost the…

Read More
Why Technology Partnerships Are Crucial for Financial Services Institution Compliance

It’s an industry that’s been a little more reluctant than most to shift its infrastructure and computing needs to the cloud, but it’s an inevitable transition that the financial services sector must embrace. After all, the raft of benefits cloud computing platforms afford organizations is undeniable – agility, scalability, on demand compute power, competitive pricing models, the list goes on – yet there was always two closely-associated factors that prevented financial services and baking institutions from jumping on board: security and compliance. However, while naysayers were saying it would never happen and that banks would never entrust their precious data to public cloud providers, many institutions were already experimenting with cloud technologies – even if they weren’t actively announcing it. The turning point, so to speak, where the world was put on notice as to just how pivotal the cloud could be for the financial services industry, came when Capital…

Read More