Posts Tagged ‘security’

Mind your business: ‘Smart’ monitoring service launches for Small Businesses

image for Smart BizWant confidence that your staff working the late shift is safe? Left the shop and forgot to arm your security system?

Today, we introduced Smart Business Monitoring, a new way for business owners in Rogers cable footprint and Golden Horseshoe to easily connect, protect and manage what’s happening at their business from anywhere, at any time using their mobile, tablet or computer.

With Rogers Smart Business Monitoring, customers can choose from three different packages based on their business’s needs and budget.  Unlike conventional security platforms, the system connects to night vision cameras, lighting, door and window sensors, and monitor for intruders, motion detection, water leaks, carbon monoxide, smoke and fire. All features can be customized and easily controlled through a mobile app. Check out some of the key features:


  • Adjust your business’s lights and control small appliances via your device (smartphone, tablet, laptop, desktop computer), on site or remotely.
  • Set programmable rules for those functions, as well (e.g., set the alarm to be disarmed at 8:55 a.m., or have the lights to go off at 7:05 p.m.)
  • Sensors to detect intruders, smoke, water leaks, carbon monoxide and more.


  • 24/7 monitoring by a team of security experts at a centralized monitoring station.
  • Simultaneous dual-network (wireless and broadband) protection to ensure your system is always connected.
  • Speak to a security expert immediately with one click of your system touchpad.
  • Customizable alerts. Choose which alerts to receive, in what way, and whether anyone else on your staff receives them, as well.
  • Remotely arm or disarm the system.


  • Cameras that support day/night vision, and offer image and video capture.
  • Monitor what’s happening at your place of business – from wherever you are– via live video streams or image captures, so you always know what’s going on.

Today, residents of Southern & Eastern Ontario, New Brunswick and Newfoundland and Labrador book a FREE assessment by visiting

share this 1 Comment

Improving mobile device security and management

enwinEnWin Utilities distributes electricity and services Windsor’s power infrastructure for over 83,000 customers. They also provide management services for fleet, billing, collections, credit, financial, human resources, customer service and information technology services to Windsor Utilities Commission and the City of Windsor.

Like many other businesses, EnWin Utilities’ mobile IT environment used to be a lot more homogeneous; until December 2012, the electricity distribution company only supported BlackBerry smartphones plus some ruggedized laptops for field workers. EnWin began to face pressures from various parts of the organization to support other devices and operating systems on the corporate network. In part, this demand was driven by the desire to roll out mobile applications for field crews, management and executives. “Our BlackBerry Enterprise Server did not support other devices, which meant that the IT team could not enforce security policies or wipe lost or stolen devices,” said Andrew Ciavaglia, Technology Services and Support Manager at EnWin. While Ciavaglia and team realized that they needed a mobile device and mobile app management solution, they also didn’t want to overburden the IT administrators.

EnWin turned to Rogers Communications for an enterprise mobility management solution that would allow the IT department to manage its fleet of devices and securely roll out apps to end users. Rogers suggested a managed solution that would deliver all the security and control benefits that EnWin needed while minimizing the time and effort of IT administrators. Rogers provided a fully managed, cloud-based mobile device management and mobile application management solution. “Rogers worked closely with us to set up our security policies, onboarding tools and end user documentation,” said Ciavaglia. Today, participants in the program can enroll themselves, and soon they will be able to download approved business apps through a secure enterprise app store.

EnWin has identified a number of benefits from its managed MDM solution:

Improve mobile security. The managed MDM solution allows EnWin to secure company and customer data on devices and on the EnWin network. “This solution gives us peace of mind. We know we can act to protect ourselves if anything happens.”

Simplify deployment and management. A cloud infrastructure and Rogers managed services significantly reduce the level of effort for EnWin. “With a managed solution, we don’t have to invest as much time ourselves. We know that the software is up to date, that we’re running the right version.”

Control costs. The hosted and managed solution has enabled EnWin to eliminate up-front infrastructure costs, reduce ongoing resource requirements and achieve cost predictability.

Enhance employee satisfaction. With the managed MDM solution in place, EnWin’s IT team can secure, manage and support the mobile devices and apps that employees want to use to be more productive.

How does your IT organization manage and secure smartphones and other mobile devices?

share this 0 comments

Addressing 4 key challenges of BYOD

BYOD security challenges image smallWith the growing popularity of smartphones and tablets, more and more enterprises are adopting a bring your own device (BYOD) strategy to build the connected mobile enterprises of the future. However, some IT managers are concerned that mobile workers using their own unsecured mobile devices for work could lead to IT security issues.

Many of these concerns are based on misconceptions about mobile security. With an effective security strategy, BYO mobile computing can deliver real gains to the enterprise in terms of productivity, efficiency and more engaged mobile users.

Below we explain four of the key perceived challenges about mobile enterprise data security and policies:

 “BYOD users are security problems.”

Even if you haven’t enabled a BYOD policy, employees may already be using personal mobile devices to access, manipulate and share enterprise data through mobile apps. By implementing a BYOD program with the right policies and tools, you are not only securing your data against unauthorized access but also increasing employee productivity by creating new ways of performing tasks. By taking a comprehensive view of enterprise mobile security, organizations can reduce risk and reap the rewards of a more engaged, connected mobile workforce.

 “Enabling BYOD increases the complexity of IT environments.”

Businesses already manage complexity by providing corporate-owned smartphones and tablets to employees and allowing them to work from home by connecting through a virtual private network (VPN). The big thing that’s changing with BYOD is allowing personally owned devices secure access to your enterprise network. There are now tools that make it easier to manage this and reduce the risk (see next section). Enabling BYOD could outweigh the cost of managing complex IT environments by providing improved flexibility and enterprise agility.

“Mobile security is a primary technology challenge.”

It can’t be denied that hackers are finding new ways of attacking mobile devices and corporate networks, but that shouldn’t be a hindrance to adopting BYOD. Consider using a mobile device management (MDM) solution to manage the fleet of mobile devices that connect to your network. With MDM you gain complete visibility and control over mobile devices; detailed hardware and software inventory, location, network and usage data and can bring mobile computing into compliance with IT security policies. If implementing and supporting MDM is one more thing than your IT team will struggle to manage, consider a managed MDM solution.

“BYOD can pose a threat to personal employee data too.”

IT managers who allow personal devices into their businesses have expressed concerns about security threats to corporate data due to loss of mobile devices, data integrity compromises and sharing of sensitive confidential information over social media. But some IT managers see a threat to personal data too.

When a device carrying corporate data is lost, stolen or compromised, IT needs to be able to lock it down and even wipe the data. When an employee leaves the company, IT may also need to remove all company information. The perceived risk in these situations is that individuals will sacrifice personal emails, photos and apps to satisfy corporate privacy and security policies. But containerization tools are making it much easier to keep personal and corporate data and apps separate on both BYOD and COPE (corporately owned, personally enabled) devices.  You need to respect the privacy of users and secure only the corporate data on personal devices.

Please visit to learn about how Rogers can help you build a secure mobile enterprise.

How are you addressing mobile security concerns in your organization?

share this 0 comments

Six questions about network infrastructure with Eric Simmons

Eric Simmons M2M Manager Rogers CommunicationsAs General Manager, Machine-to-Machine (M2M) for Rogers, Eric Simmons is responsible for overall product, marketing and sales operations strategies for M2M and advanced business solutions.

1. With more and more new connected technologies available, what do businesses need to support all these new solutions?

First and foremost, an open mind to the possibilities of what new technologies can do for business and how you can gain competitive advantage. The next thing is to find a solution provider that understands how these new technologies work and their potential. Understanding organizations’ core business needs and what technology can do for them is just part of the story—your provider should be able to both implement technology and manage the solution.

2. What’s the business value of having your networks talking to each other?

Connected technology means businesses can move faster than the competition and differentiate from them on the market; it’s about getting more value, a faster ROI. You can’t do this without the right network infrastructure. But managing “the connected lifecycle” of the customer—wireless, Wi-Fi, Bluetooth, etc.—means taking a holistic view of the customer’s business, including their assets, their goals, their specific needs and so on.

3. More and more services are being moved to wireless networks—what kinds of security concerns are associated with this trend?

There’s understandably a lot of concern around security as a whole and connected devices specifically, and organizations are doing everything they can to protect their data. Devices have security and encryption built right in. We set up custom APNs (Access Point Names) for another layer of security. So we can really manage and ensure data protection across the whole organization by offering solutions that meet each business’s security needs, and by tying connected technologies into their existing security platforms.

4. What kinds of intelligence can businesses capture from smart networks?

Predictive analytics mined in real time can predict and prevent equipment failure. For example, with an oil and gas well head (pump jack) you’re measuring valve pressure, vibrations, leakage sensors, etc. This data is valuable for one customer but aggregate data from multiple customers can help predict and prevent problems.

Or, for example, in a retail environment: a lot of anonymous information can be captured using sensors and Wi-Fi networks, such as how many people are entering a store and where they’re going in the store. If they opt in, you can also capture demographic and other information and even send them information. The value of the data can make a huge difference in business decision-making. There are understandably a lot of concerns around anonymity/privacy, and a lot of work is being done on how data can be used. Rogers is closely following these developments.

5. What should businesses consider when adopting a wireless service?

Complex problems require holistic solutions. A wireless app requires development and customization, modems, networks, sensor equipment, spare pooling, returns, etc. The traditional model involves different providers for hardware, software, network access and professional services, which can create uncertainty and delay when technical issues arise.

A solution partner providing end-to-end support can simplify and streamline businesses’ deployment timelines and reduce costs. One company, one point of contact, one bill: an organization with expertise in the whole deployment process and all its technical components can provide all this and more.

6. What sorts of products or services should businesses think about moving into the cloud?

Things that aren’t part of a business’s core competencies, like Customer Relationship Management or Mobile Device Management, should be moved into the cloud. The cloud is valuable because it enables new technology, it’s off-site, it’s relatively low-cost and it allows businesses to get things up and running fast.

Globalization allows inputs to come in from all over the world; not having access to the cloud, to the Internet of Things, really narrows business focus and makes it hard to see what competitors are doing. We’re only as smart as the people in our office, and the cloud makes the office infinitely larger.

How does your business use integrated networks?

share this 0 comments

Four spring cleaning tips for small business

Spring cleaningThe beginning of spring is the perfect opportunity to reflect on (and revise) 2014 goals, clean up shop and try something new. Take in a breath of fresh spring air and be happy that the worst of the longest, darkest, Canadian season is coming to an end … we hope!

Here are four ways to think about your small business spring cleaning routine:

  • Free it up: No matter how good you are about keeping your computers and smartphones up to date, all devices seem to slow down after time. This is often caused by too many unused programs, missing updates, or left over programs and old cached and temporary files. Whatever the cause, you need to find the big space hogs, identify which ones are worth deleting, and make sure you aren’t harming your system in the process. It’s also a good idea to go through your applications folder and delete any unused games, apps, or programs you no longer need.
  • Back it up: OK, you should do this once a week, not once a year but this nudge may serve as a reminder if you are behind in your backups. Use flash drives, an external hard drive or a cloud-based service like Rogers Mobile Work Folder to make sure all your files are safely stored. This is especially important if you have multiple people in a home using the same computer or tablet. You risk losing documents, downloads and important photos if you neglect this step. 
  • Lock it up: Spring is a great time to change your passwords. There are a ton of password generators out there. Once your computer and smartphone are clean and passwords are new, it’s time to protect your devices by making the small but powerful investment in virus and security protection. McAfee All Access allows you to enjoy secure information across all your devices including PC, Mac, smartphone, and tablet.
  • Clean it up. The build-up of dirt, grease and germs on your tech gear is probably something you prefer not to think about, but it’s important to clean your gadgets regularly! Use a can of compressed air to unearth any stray food, hair or lint from your keyboard. Next, dab some alcohol on a cotton ball and clean your keys, mouse and area around your keyboard. The best way to remove grease and dirt from your smartphone or tablet screen is with a micro-fibre cloth, available at supermarkets or online. The tiny, split fibres of micro-fibre cloths lift the dirt and retain it, as well as absorb liquid.

How do you prepare your small business for spring?

Lauren is a regular contributor to RedBoard Biz 

share this 0 comments

4 ways to protect your business online

SecurityConnected for Business shares helpful tips on passwords, protecting your Twitter account and how to defend against spam. This article originally appeared on

Did you know online fraud costs Canadians US$3 billion per year? And that the growing popularity of smartphones, tablets and open Wi-Fi networks are making us more vulnerable to online fraud and other forms of cybercrime?

These figures, from an October 2013 report by security-software firm Symantec Corp., are a startling reminder for us all to be careful as technology changes. According to Symantec’s Canadian director of consumer solutions, Lynne Hargrove, cybercrime rates have doubled since 2012, with offences ranging from credit-card fraud to identity theft.

If you run a small business, the costs associated with fraud can cripple, or even sink, your company. But there are simple ways to help protect your website, email and digital devices from breach. These aren’t new tips; you’ve heard them before. But perhaps now is a good time for a reminder on the basics of online protection. Grab a seat. Class is in session.

1. Create Crack-Proof Passwords

From mobile devices to desktop computers, servers to cloud computing, everything seems to require a password these days. And while it may be tempting to use the simplest passcode, this is a bad idea. After all, if someone can guess it, then you’re inviting potential harm into your business. As a general rule, don’t use a birthday or maiden name. Instead, use a mixture of numbers, upper and lowercase letters, and symbols for a password that’s at least eight characters long.

Tip: Think of a phrase that’s easy for you to remember. Now take the first letter of each word in the phrase and this is your password. Include caps and numbers where possible or add them to the end.

Example: 2 out of 3 ain’t bad / Password: 2oo3ab – OR – Bruce Springsteen sings Born in the USA / Password: BSsBitUSA

2. Change Your Passwords Frequently

It’s this simple – the longer you use the same password, the more vulnerable you are to attacks. So, by changing your passwords monthly, or every 60 days, you’re making it that much harder for a hacker to figure it out.

3. Don’t Respond To Spam

We all deal with spam, and while some of it goes directly into our spam filters to be deleted, other phishing schemes can be much more subtle and dangerous. You might even receive a spam message where the sender is one of your contacts. If you do receive something odd from a contact, reply to the person in a separate, new email. Also, it goes without saying, don’t ever reply to spam, even out of spite. Simply delete.

4. Change Your Permissions If Your Twitter Account Is Hacked

If your Twitter account is compromised, log in and change your password. Select a brand-new passcode. Then, while logged in, revoke all connections to third-party applications that you don’t recognize. As a preventative measure, you can also install login verification. To log into Twitter, you will need to enter your password, and then enter a separate, six-digit code sent to your smartphone. This way, if someone tries to access your account, they won’t be able to sign in.

How To Set Up SMS Login Verification

1. Log in to Twitter and go to your security and privacy settings.

2. Select the option to “send login verification requests to my phone.”

3. When prompted, click OK, send me a message.

4. Once you receive the verification message, click Yes and enter in your password when prompted.

share this 5 Comments

The risks and rewards of BYOD

BYOD risks & rewards imageWhen it comes to BYOD (bring your own device) support in organizations, there is often a great divide. From a security perspective, dealing with personal mobile devices on the network can create security holes that are tricky to fix, because locating the source device is not always easy. On the other hand, many organizations realize that personal mobile devices are part of the workplace culture and, if supported with the right policies, can help employees be more productive.

Sadly, a very small percentage of organizations have a formal policy in place when it comes to security and mobile devices, especially for BYOD.  This pushes a problem upon IT departments, because they are tasked with both securing the device and also managing the ability to support a wide variety of devices.

From a security perspective, having many Wi-Fi devices (mainly tablets) on the network can create a risk.  Employees want to access the corporate network from their device, but managing individual password requests is incredibly time consuming (not to mention the password reset support required).  Throw in contractors, temporary employees, vendors and other guests and… you get the idea.

When users are connected with unsecured devices, they are also a risk, as they can inadvertently allow access to the corporate network through malware installed on the device, or in the case of loss or theft.  Once the Wi-Fi network has been breached, it will be much easier for unauthorized users to gain access to the network from outside the premises.

The main reluctance arises on the IT infrastructure side. These folks are responsible for securing and troubleshooting all devices that are considered business devices. The certification of business devices is a long and arduous process, and employees are increasingly particular regarding which devices they wish to use.

Here are a few tips for businesses considering extending mobility to more of their workforce through programs like BYOD:

  • Put a formal policy in place that defines the company’s rules for mobility.
  • Implement a mobile device management solution to secure and manage all devices connecting to the company network.
  • Limit the list of devices that you support to lighten the load of the IT team.

Extending mobility to more employees is not all risk and no reward. Internal applications, such as conferencing, expense management, analytics or social media marketing, can help increase productivity and collaboration if implemented properly. It’s much easier to push out new information and marketing content to employees via applications than it is to rely on your company intranet. Some MDM solutions enable app distribution through a secure “enterprise app store”.

Finally, mobile devices can help extend business functionality. We’re seeing this especially in retail, in regard to accepting mobile payments. This type of application can be built to integrate with banking, accounting and other customer-related applications. If you are already investing in a mobile solution, extending this type of functionality to all employees who will benefit from it can yield better ROI.

Are you considering implementing a BYOD policy? What risks concern you?

share this 0 comments

How to protect your company data

SecurityConnected for Business writer Bryan Borzykowski shares five ways businesses can help prevent computer fraud. This post originally appeared on

It’s a lot easier and cheaper to prevent computer fraud than you might think. Here are five ways to stop cyber-criminals from stealing sensitive data.

Update anti-virus software

While most people know that they need to install anti-virus software on their computers, it’s also important to upgrade these programs when new updates are released. Sunil Mistry, a partner at KPMG Enterprise in Toronto, says that many business owners fail to do this. “There are constant viruses and phishing emails that figure out ways to get through anti-virus software and into an inbox,” he says. “The updates make sure that any gaps are covered.” Anti-virus software should send any potential phishing scams – emails that ask you to click on a link and enter information – to your spam folder and delete any emails that have viruses attached. Users will typically get an alert when a new version is released, so there’s no excuse not to upgrade.

Wipe data off old computers

Business owners often throw out old computers, but many fail to erase the sensitive data that’s on the hard drives, says Mistry. “You could have a bunch of passwords on it, or an Excel document with credit card information that someone forgot about,” he says. Wiping hard drives of data is becoming more important as computers become cheaper, he says. Companies can now upgrade systems every couple of years. With many companies donating or selling the old computers, you never know if it will fall into the wrong hands.

Use encryption software

If you’re sending sensitive data – such as customer information to a supplier – via the internet, you need to install encryption software. This puts a “casing” around the data and essentially turns it into meaningless numbers, making it harder for hackers to steal information that’s travelling from one place to another. “Encryption hides what’s being sent,” he says. “It prevents anyone from trying to access that data.” These days, most anti-virus companies offer low-cost encryption services, says Mistry.

Log off computers

It can be hard to stop an angry employee from stealing information – they’re in the building, after all. One of the best ways to prevent fraud by a staff member is also the simplest: make sure people log out of their computers when they leave their desks. “That’s a big one, even for us at KPMG,” Mistry says. Small businesses are especially at risk, since it’s easy to tell when the boss goes on a lunch break. Often times, no one else may be around. “If you don’t have the right people there, you can easily be taken advantage of.” Logging off makes it significantly harder for a fraudster to quickly grab information.

Lock down computers

Computer fraud doesn’t always occur via insidious emails or a quick transfer of data to a USB key. Mistry has heard of numerous companies that have been compromised after someone walked out of the building with a computer. It may seem outrageous, but it’s not hard to steal a company laptop. He recommends actually bolting down computer hardware. “Lock down the laptop to the leg of a desk,” he says. “People aren’t going to get cable cutters to get it.”

share this 1 Comment

How Mobile Workers Will Change Your Business

This post, written by Melissa Campeau, originally appeared in

A new IDC Canada report suggests organizations will rethink policies, security and collaborative tactics as teams go mobile

If you haven’t seen all your employees in one room since the holiday party, welcome to the new mobile norm. It’s been projected that 73% of employed Canadians will be at least somewhat mobile by 2016. But empowering staff to work anywhere, any time will necessitate a change in business practices over time.

A new report by IDC Canada predicts the Canadian mobile worker population will grow from 69% to 73% by 2016. The study, based on multiple sources including Statistics Canada labour force data and a survey of 500 Canadian executives, defined a mobile worker simply as someone who is not always working at a desk. “They could be a travelling executive, a sales rep, a field worker, a telecommuter, working on location or just working from a Starbucks a few hours each day,” says Krista Napier, senior analyst and tracker lead, mobility for IDC Canada.

While businesses of all sizes have experienced an uptick in the number of mobile workers, IDC research shows small companies in Canada are much more likely to have on-the-go employees than their larger counterparts. Specifically, says Napier, workers in smaller companies are more likely to spend at least three days a week away from their office, whether in the field, on location or working from home.

With this evolution, the report predicts significant changes to the way businesses operate. And because small businesses are already wading into the deep end of the mobility pool, they’re likely to experience the forecasted trends first.

Planning specifically for mobile expenses will become the norm, if it’s not already. “Smaller companies will need scalable and affordable solutions for dealing with a more mobile workforce,” says Napier.

Businesses will also look to develop a framework for mobility, suggests the report. A policy for mobile work could provide a guideline for managers and employers to understand expectations, security issues and more. This might also include extra training, Napier notes, to make sure workers know how to get the most out of their mobile devices.

While there are clear benefits to mobile work, less face time with colleagues could translate into fewer impromptu brainstorm sessions and exchanges of ideas. Organizations will look to counter this, suggests the report, by making greater use of collaborative tools including social networking sites, video conferencing and webinars.

Not surprisingly, businesses are likely to lean more on the cloud, as workers become increasingly mobile. With employees able to access data more easily and independently, IT professionals will be able to spend more time developing business-enhancing initiatives instead of focusing mainly on maintenance, the report notes.

And finally, weaving loss-prevention solutions into mobile strategies will be more and more necessary, since an increase in mobile workers can amount to an increased risk of exposed information. “Security around both the hardware and the data residing on them will become more complicated as trends like BYOD (bring your own device) continue to proliferate,” says Napier. “They will need to be addressed.”

To see the original article, go to 



share this 0 comments

Managing mobile technology while travelling for business

Tips for business travel with RogersThis week we bring you part II of our series on managing mobility costs while travelling as a small business. In our last post, we talked about how to find the right plan that “fit” your travel activity and use of mobile devices. This week, we look at making sure you have a secure wireless internet connection when on the go.

How to set up a secure connection to internet and data services outside the office

We expect to be able to access the internet wherever we are for whatever we need. However, when you are on the road or travelling abroad for business, accessing the internet can be challenging. Not only may connections be slower, but you are also at a greater security risk, especially when connecting to public networks or using a public computer.

The key to using the internet securely when traveling is to understand the additional risks, use caution and be prepared.

Control your own internet in public Wi-Fi zones

Public Wi-Fi is often the most convenient choice – especially if you want to check a quick email in a coffee shop. However, cyber-hacking software and wireless eaves droppers are on the rise, creating a point of vulnerability for public Wi-Fi users.

You can create a secure internet connection by using a mobile internet product like a mobile internet stick, hotspot or hub. These products offer a personal connection with automatic encryption to protect your information while you’re online. To learn more about how protect your device from security threats, read our Security eBook.

Invest in a data plan

Sometimes business travelers use Wi-Fi when not on their provider’s network to avoid high roaming charges. If you equip your international travelers with smartphones or tablets with roaming data passes and travel packs for roaming, concern disappears and they can stay connected and keep their data protected from prying eyes.

To learn more about Rogers’ data plans and what is right for your business read our Wireless Data vs. Wi-fi whitepaper.

A checklist for ensuring a secure internet connection on-the-go

Regardless of the devices you travel with – a laptop, netbook, smartphone, iPad, or all of the above – there are a few simple steps you can take to secure your public internet connection. Here’s a check list to consider:

  • Make sure your security software is up-to-date, before every trip, or at least every few weeks, it’s a good idea to check the “software updates” on your device to check if a new one is available. If there’s a new one, download it.
  • Use strong passwords. Use a strong combination of letters, numbers and/or special characters and change your passwords frequently.
  • Encryption is the key to keeping all of your information secure online. To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure). Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, your entire account could be vulnerable. Look for https on every page you visit, not just when you sign in.
  • Don’t be fooled by access fees – paid hotspots are often unencrypted and just use a captive web portal to prevent access if you haven’t paid yet.

If there additional topics you would like us to cover, please let us know in the comments section.

For more information on mobile internet products, travel packages or other Rogers products visit:

For more information on security for individual operating systems, please visit the following:

Lauren is a regular contributor to RedBoard Biz

share this 0 comments