Skip to content
Our resources

Cybersecurity resources: Your knowledge hub to anticipate and act

Access our library of expertise: analyses of the latest threats, practical guides to strengthen your security, answers to your questions, and webinar recordings. All the knowledge you need to make informed decisions.

Up-to-date analyses and breakdowns of emerging threats

Our blog is your reliable source to stay on top of the latest trends, vulnerabilities, and best practices. Our experts turn technical news into actionable insights.

Regular & Varied Content:

  • Threat Analysis: Breakdowns of the latest ransomware campaigns, zero-day vulnerabilities, and social engineering techniques.
  • Compliance & Regulation: Updates on Law 25, GDPR, and other regulatory frameworks affecting Canadian companies.
  • Practical Guides & Tutorials: “How to set up two-factor authentication”, “Checklist to secure remote work”.
  • Expert Perspectives: Thoughts on security strategy, risk management, and corporate culture
Articles

Pourquoi votre PME est une cible plus intéressante qu’Amazon pour les hackers

Introduction « On est trop petits, ça ne vaut pas la peine qu’on nous attaque. » Chez Sécurité Info Services, nous entendons cette phrase presque…

Actualités

Gouvernance sécurité : 5 signes que votre entreprise a besoin d’une meilleure gouvernance

Introduction « On a un antivirus. On a un pare-feu. On est protégés, non ? » C’est ce que nous entendons souvent chez Sécurité Info…

Actualités

Top 10 des vulnérabilités les plus exploitées en 2026 – Guide pour les PME québécoises et canadiennes

Introduction « On fait les mises à jour une fois par mois, c’est suffisant. » Cette phrase, entendue chaque semaine chez Sécurité Info Services, est…

White papers & Practical guides

In-depth resources for specific challenges

Download our complete documents, drawn from our field experience, to dig deeper into critical topics and get detailed action plans.

The Ultimate Guide to SOC as a Service for SMBs

Description:

Everything you need to know about outsourcing security monitoring: benefits, costs, how to choose, implementation.

Who is it for?

Executives, CIOs, CISOs

Download the guide

Law 25 Compliance Checklist – 2024 Edition

Description:

A step-by-step operational tool to audit your compliance and prioritize your actions.

Who is it for?

DPOs, Compliance Officers, Executive Leadership

Get the checklist

Vendor Risk Management: Protecting Your Ecosystem

Description:

Methodology and templates to assess and oversee the security of your subcontractors.

Who is it for?

Procurement, Legal teams, Security Managers

Download the white paper

Incident Response Plan (Complete Template)

Description:

A ready-to-customize template to respond effectively to a cyberattack.

Who is it for?

The entire company

Access the template

These resources are free in exchange for your contact information (simple form), allowing us to send you targeted advice afterwards.

Clear answers to your most frequent questions

Quickly find reliable answers to your questions about our services and general security topics.

A scan automates the search for known vulnerabilities. A penetration test simulates a real attacker exploiting those vulnerabilities and finding new ones, measuring the real impact.

It depends on your initial maturity. For an SMB, a complete project can take from 2 to 6 months. We always start with a diagnostic to give you a precise estimate.

No, it’s a complement. Insurance covers you financially after an incident. A security program aims to prevent the incident. In fact, insurers often require minimum security measures.

Start with the human and organizational basics: phishing awareness, strong password policy, tested offline backups. Our guide “The First 5 Actions” can help.

Yes. We offer a free 45-minute discovery consultation to discuss your challenges and see how we can help. For targeted technical analyses (e.g., surface scan), we sometimes offer limited proofs of concept.

On-demand webinars

In-depth learning from your desk

Rewatch our interactive online sessions, led by our experts, on specialized topics. Ideal for training your team at your own pace.

In-house SOC vs. SOC as a Service: The Technical and Economic Matchup

Content: Detailed comparison of costs, required skills, and operational benefits. Includes a client testimonial.

(Duration: 45 min)

Watch the recording

Roundtable: Lessons Learned from Implementing Law 25

Content: Feedback from DPOs and SMB executives. Q&A on practical challenges.

(Duration: 60 min)

Watch the recording

Live Demo: How an Attacker Exploits a Cloud Misconfiguration

Content: Live technical demonstration in a sandbox environment, followed by remediation advice.

(Duration: 30 min)

Watch the recording

Subscribe to our newsletter to be notified of upcoming live webinars.

Stay Informed

Never miss a new resource or important alert

Sign up to receive a monthly summary of our best articles, new guide announcements, and invitations to our webinars.

Subscribe to the “Cybersecurity Vigilance” newsletter

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Receive practical advice and analyses every month, straight to your inbox.