Privacy Policy

This page is used to inform website visitors regarding our policies with the collection, use, and disclosure of Personal Information if anyone decided to use our Service, the Calgary Cyber Security website.

If you choose to use our Service, then you agree to the collection and use of information in relation with this policy. The Personal Information that we collect are used for providing and improving the Service. We will not use or share your information with anyone except as described in this Privacy Policy.

Information Collection and Use

For a better experience while using our Service, we may require you to provide us with certain personally identifiable information, including but not limited to your name, phone number, and email. The information that we collect will be used to contact or identify you.

However, we do not collect any personally identifiable information about you unless you voluntarily submit contact information to us, such as name, phone, email address, and mailing address by filling out a form or survey, registering your email address with us or emailing us. We do not use personally identifiable information collected from the website to send unsolicited mailings to you

Log Data

We want to inform you that whenever you visit our Service, we collect information that your browser sends to us that is called Log Data. This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser version, pages of our Service that you visit, the time and date of your visit, the time spent on those pages, and other statistics.


Cookies are files with small amount of data that is commonly used an anonymous unique identifier. These are sent to your browser from the website that you visit and are stored on your computer’s hard drive.

Our website uses these “cookies” to collection information and to improve our Service. You have the option to either accept or refuse these cookies, and know when a cookie is being sent to your computer. If you choose to refuse our cookies, you may not be able to use some portions of our Service.


We value your trust in providing us your Personal Information, thus we are striving to use commercially acceptable means of protecting it. But remember that no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and we cannot guarantee its absolute security.

Links to Other Sites

Our Service may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by us. Therefore, we strongly advise you to review the Privacy Policy of these websites. We have no control over, and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

Changes to This Privacy Policy

We may update our Privacy Policy from time to time. Thus, we advise you to review this page periodically for any changes. We will notify you of any changes by posting the new Privacy Policy on this page. These changes are effective immediately, after they are posted on this page.

Contact Us

If you have any questions or suggestions about our Privacy Policy, do not hesitate to contact us.

Protect your business today!!


Protect your business today!


The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.

A criminal dealing in stolen credentials can make tens of thousands of dollars from buyers interested in purchasing credentials. And by selling those credentials to multiple buyers, organizations that experience a breach of credentials can easily be under digital assault from dozens or even hundreds of attackers.

Do you know if your sensitive information is available for purchase on the Dark Web?

Contact our security experts about the Dark Web today!

With the sharp increase of remote workers during COVID-19, malicious attacks have also increased. As users are working remotely often they’re not under the same protection. This has lead to more attacks targeting remote workers.

Instances of cyber-crime appear to have jumped by as much as 300 percent since the beginning of the Coronavirus pandemic, according to the FBI. The bureau’s Internet Crime Complain Center (IC3) said last week that it’s now receiving between 3,000 and 4,000 cybersecurity complaints every day, up from the average 1,000 complaints per day the center saw before COVID-19 took hold.

If you’ve not taken any additional measures to address these concerns you may be susceptible to an attack.

Contact one of our security experts today!

Privacy and cyber-security is a big concern to businesses, for the second consecutive year. This is according to a new report by Protiviti and ISACA, based on a poll of 1300 IT audit and internal audit leaders and professionals.

The report finds that, surprisingly 37% of businesses did not add cyber-security within their audit plans. Many have failed mostly due to a lack of resources. A key finding of the report suggests:

Considering the growing risk landscape resulting from cybersecurity threats and emerging technologies, more organizations should consider an approach that includes continually reviewing the IT risk landscape and adjusting IT audit plans accordingly.

If you have not incorporated security into your yearly audits, we can help!

Contact our security professionals today!

Identification, valuation and categorization of IT assets is critical to properly developing and deploying the required security controls for your business.

Organizations implementing security controls must first identify and categorize the organization’s IT assets that need protection. Without understanding the value of your IT assets you can’t place the proper security controls around them.

Contact us about asset valuation and protection today!

An recent IBM study revealed that the mean time before detection for a breach was 197 days:

This year we conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. According to the findings, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year.

A majority of businesses that have been breached are unaware for months, while some only find the breach due to the offending party reaching out. Without detection methods or proper procedures in place your business is vulnerable.

Contact us to start a security conversation today!

With the increase of workers accessing company resources remotely, businesses need to be protected. Some important things to consider:

Does the machine connecting to the corporate network have an Anti-Virus/Spyware protection? Is it up to date for security patches? Is it connecting through a secured connection? How are you confirming the above?

Due to the increase of targeted attacks on remote workers during Covid-19 your business needs to be vigilant.

Start protecting your remote workers today!

As COVID-19 continues to impact businesses having a Disaster Recovery Plan or Business Continuity Plan is more apparent. A 2017 Study on Disaster Recovery Statistics shows that:

  • 33% of businesses are unprepared for disaster, despite having an existing Disaster Recovery Plan (DRP) in place
  • 33% of business have no disaster recovery plan at all.
  • 90% of Businesses will fail after a disaster without a DRP in place
  • 96% of Businesses survive ransomware attacks when they have a reliable DRP in place.

Using well-accepted methodologies can help minimize the impact, cost, and recovery time for your organization when an incident occurs.

Contact us to assist with your business continuity plan today!

Schedule your free consultation with us today!                                             

Microsoft takes care of quite a bit for companies, it manages their Office 365 infrastructure and maintains uptime for their users. However…


Microsoft does not back up your data.


In the event of a Ransomware attack, virus or any compromise to your files would be unrecoverable.

Contact us to start backing up your data today!