Skip to Main Content

Latest Insights

109 results found

Case Study | COVID-19 Response Services

COVID-19: Resources Available for Crisis Response

Calian’s team of emergency management specialists and health care professionals are available to support your COVID-19 response. We offer services including: onsite rapid testing, quarantine site management, COVID-19 screening, vaccination clinic staffing, and more.

Learn More

Case Study | Emergency Management Solutions

Developing Comprehensive Plans: Village of Telkwa

Calian worked with the Village of Telkwa, British Columbia to develop a guide with preplanned routing and advance decisions to support residents during an evacuation, and to help the Village meet its legal responsibilities to be prepared for potential emergencies or disasters.

Learn More

Blog | March 1, 2021

Celebrating the Women of Calian – International Women’s Day 2021

International Women’s Day is March 8, a time to celebrate women’s achievements, raise awareness, and empower women around the world. Meet some of the women from Calian who continue to play an extraordinary role in advancing workplace equality.

Learn More

Blog | February 22, 2021

Enhance Your Security Posture

Calian offers cyber security services and solutions to mid- to enterprise-size organizations at all levels of government, defence, and private sector. Our strategy of combining organic development with mergers and acquisitions benefits our customers. We deliver the innovative solutions you need to improve and maintain your security posture.

Learn More

Blog | February 22, 2021

Modernize Your Healthcare Infrastructure and Manage Cyber Risk

Those of you in the healthcare industry who are responsible for IT had a lot to contend with in 2020. COVID-19 accelerated demand for virtual services. Migration to the cloud remained a goal. And the 2020 data breach of the US federal government reminded that security is paramount.

Learn More

Blog | February 22, 2021

Helping Government Achieve Cloud Migration Goals—Securely

Calian helps government organizations of all sizes and across all levels securely migrate to the cloud. 

Learn More

Blog | January 26, 2021

How do you perform an AAR that doesn't collect dust on a shelf?

An after-action review (AAR) is a tool that supports organizational continual learning and improvement. Like any tool, it is only as good as its application, so a careful evaluation process and comprehensive data collection and analysis is critical. The AAR has been refined over years of application and is considered a best practice. So why do so many AARs fail to meet the needs of the organization?

Learn More

Resource

Calian's 2020 Annual Report

Despite the challenges that came with COVID-19 in 2020, Calian Group Ltd. delivered an impressive performance in it's fiscal year. To read the company's full annual report and learn more about the 2020 fiscal year highlights, download the report here.

Learn More

Resource

Calian Cyber Security Podcast - The Myths and Realities of Cyber Security Penetration Testing

In our last podcast of 2020, our cyber security specialists delve deep into the world of Cyber Security Penetration Testing—and how ethical hacking and cloud security auditing is the only way to truly keep organizations safe in 2021 and beyond.

Learn More

Resource

Calian Cyber Security Breach Report - Issue 15 Data Breaches in Online Education

In today's digital business environment, enhanced and holistic cyber security is essential. However, many companies continue to struggle with resilience, often experiencing breaches that lead to everything from compliance issues, to lost and stolen data and, ultimately, to brand damage and revenue loss. And though it is easy to read about these breaches, the causes and potential solutions are rarely identified.

Learn More

Resource

Calian Cyber Security eBook - The worst passwords of 2020

How to Avoid Becoming the Next Cyber Crime Victim

Learn More

Blog | November 26, 2020

This is all about your employee’s stolen identity

Everything in the modern age is digital—and of course you all know that. However, most people rarely contemplate what data is circulating around out there in the ether. Take one step further down the rabbit hole and apply that to personal data and, again, many still don’t internalize the importance or magnitude of what they create, share, and what is ultimately stolen for nefarious purposes.

Learn More