Terranova Free Conference: Successfully engage your employees in contributing to sustainable development

dd-blogSuccessfully engage your employees in contributing to sustainable development
Terranova, in collaboration with Umalia and WeSustain, invites you to a conference dedicated to successfully engaging your employees in contributing to sustainable development. Come and hear our experts from Québec and Germany, and take a guided tour of the first LEED® Platinum-certified in Québec. Continue reading…

Serious Gaming

Serious gamingTerranova is breaking new ground in information security training and awareness by including the concepts and techniques of “serious gaming” in its training services. Continue reading…

Heartbleed Bug: A wake-up call situation

heartbleed-terranova-blog

A serious security vulnerability, baptized “Heartbleed,” has recently been reported in OpenSSL software, a widely used communications security product. OpenSSL sets up a secure connection between a computer and an application (e.g., the Web), by encrypting the information exchanged to protect personal and confidential data. Continue reading…


Formation Terranova, gagnant d’un Dunamis 2014!

dunamisUn nouveau collègue a fait son entrée chez Formation Terranova! Il s’agit du Trophée Dunamis que nous avons remporté mercredi dernier, lors de la 33e éditiondu gala Dunamis qui récompense les entreprises et les gens d’affaire de la ville de Laval. Continue reading…

Terranova Training finalist for the prestigious Mercuriades Awards!

blog_mercuriadeWe are very pleased to announce that Terranova Training is a finalist at the prestigious Mercuriades 2014 in the category Export and International Development.

Mercuriades, which is in its 34th year, is a competition organized by the Federation of Chambers of Commerce of Quebec ( FCCQ ) that celebrates entrepreneurship, success and ambition of local businesses. Continue reading…


Consumerization of IT Through BYOD: Is Your Company Ready?

byodThe consumerization of IT is when employees use their own personal mobile devices, such as laptop computers, tablets, smart phones, etc. at work, referred to as BYOD (bring your own device). This use is becoming increasingly common and exposes companies to a variety of risks, including the protection of personal information. Continue reading…

Governance and Information Security

governanceInformation security governance is a subset of corporate governance and can complete or encompass the governance of information technologies. It directs or strategically aligns information security activities and ensures that the company’s business objectives are reached. It also guarantees that information security risks are adequately managed and that information resources are used responsibly. Continue reading…

Supporting information security through a security policy

securityInformation security policies play an important role in information security governance. They serve to formally communicate the general expectations and intentions of senior management with respect to safeguarding information, in accordance with the business objectives and needs of the organization. It is through a security policy that management demonstrates its support of and commitment to information security. Continue reading…