Skip to Main Content

Cyber Security Solutions

Hey Alexa, give cybercriminals full access to my personal information

Those who know me will tell you that I have a love/hate relationship with IoT of any kind. The love part is easy: devices that, added to our daily routines and lifestyles, bring an almost futuristic experience to our collective lives. Then...
Learn More About "Hey Alexa, give cybercriminals full access to my personal information"

Cyber Security Solutions

Why everyone’s accounts are so easy to hack

When it comes to cybersecurity, the number of breaches happening daily are almost impossible to count. In fact, just this past week the public was made aware of several major breaches, including the Government of Canada and Amazon’s Alexa—two terrifying examples of...
Learn More About "Why everyone’s accounts are so easy to hack"

Cyber Security Solutions

Are your IoT devices about to attack you?

I know it's a weird question to ask, after all how dangerous can a wi-fi enabled thermometer be? Don't own a thermometer? Okay, how about a toy car with a mobile app that acts as a remote? Not into toy cars? What...
Learn More About "Are your IoT devices about to attack you?"

Cyber Security Solutions

How the smallest of devices pose the largest security threats

I've often said that we live in an absolutely amazing time in history. The sheer amount of technological advancements seems to know no bounds, growing exponentially as every day passes. From apps to devices, the list is virtually endless when it comes...
Learn More About "How the smallest of devices pose the largest security threats"

Cyber Strategy Solutions

Our team of industry-renowned experts paired with our technology partners enables leading-edge security strategies that meet any security need. Whether it be data protection, encryption, emissions security, endpoint security, Identity Access Management (IAM) and Privileged Access Management (PAM), or cloud security (CASB)—our team has both the expertise and technology to keep your business safe.

Learn More

Consulting Services

Organizations must continually maintain a highly resilient approach to ensure that their data, their people, and their business remain safe from cyber attacks. Our comprehensive suite of Cyber Security Consulting Services is designed to help organizations through the full range of in-depth security assessments, along with cyber security awareness training, through to product implementation and integration.

Learn More

Managed Services

Cyber security is a never-ending endeavor, one that must be continually monitored and managed, and continually evolving. It's for this reason that we have created our suite of Managed Services designed to address the most critical and time intensive aspects of cyber security. Our Managed Services include Virtual Chief Information Security Officer (CISO), Managed Security Operations Center, Managed Firewall, Cyber Awareness Management, and Security Infrastructure Monitoring and Management.

Learn More

Our Partners

McAfee
Forcepoint
Thales
Fortinet

Our success is rooted in our people.

Meet our experts

Adil Siddiqui

Cyber Security Solutions

Adil Siddiqui has been in Cyber security sales and consulting for more than 10 years. During this time he has worked with a wide range of customers including Government, Finance , Manufacturing, Energy. Adil brings to table deep knowledge of different facets of cyber security landscape and believes in platinum level service. Before cyber security Adil worked in IT Operations for over 7 years. Adil has a Masters in Engineering (M.Eng) degree in Electrical Engineering.

See expert’s full profile

Kevin de Snayer

Cyber Security Solutions

Kevin joined Calian in 2017 through the acquisition of Secure Technologies Inc. He has over 15 years of experience in the cyber industry been in the cyber industry assisting numerous Canadian Federal Government Departments and Private Sector clients create, edit and build their IT security policy, including the implementation of hardware to enforce the policy. His proficiency of IT/IS Security is based on his technical knowledge of local, wide area, VPN, and Internet network architecture and administration, with years of experience designing, implementing and maintaining enterprise level data networks. He specializes in McAfee (formerly Secure Computing) network security hardware. His experience includes various networking Operating Systems including Unix, MAC OSX, Linux and Windows, firewalls, network security, WLAN and virtual private networking (VPN). He is also a Certified MFE Firewall Instructor.

See expert’s full profile

Gloria Higdon

Cyber Security Solutions

Gloria Higdon has been with Calian since August 1999 at which time she and her business partners sold two staffing companies to Calian, Permatemp Personnel and PTI. Apart from a brief period in 2008 whereby she returned to school and did some coaching and teaching in higher education, her passion for Calian and passion for managing client relationships brought her back to Calian in 2014. Gloria possesses a Master of Arts degree in Leadership from University of Guelph. She is a skilled Senior Business Relationship Manager with over 30 years of experience managing all manner of client relationships and engagements.

See expert’s full profile

Connect with our Experts

We'll find effective solutions to meet your specific needs.

Contact Us