Businesses across sectors have become increasingly reliant on technology to conduct operations. However, any digital presence—no matter how small—presents a cybersecurity risk. Whether a business…
Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach…
The manufacturing sector has experienced rapid technological advancements over the past few years. Innovations like artificial intelligence (AI), smart machinery, equipment monitoring software, digital sales…
In recent years, many organizations have implemented stronger cybersecurity measures, including multifactor authentication (MFA). This method requires users to present two or more unique credentials,…
Cyber insurance rates softened in 2024 as competition from existing carriers increased, new players entered the market, and insureds strengthened cyber hygiene measures to reduce…
Cloud-related threats were the number one cybersecurity concern among businesses in the PricewaterhouseCoopers International Limited’s 2024 Global Digital Trust Insights Survey. Cloud computing refers to…
Database company Statista reported that the average cost of a data breach in Canada in 2024 was $4.66 million. Evaluating backup and recovery plans is…
Artificial intelligence (AI) has made its way into many workplaces and is rapidly changing how organizations operate and make decisions. AI’s ability to enhance processes,…
When a cyber incident strikes, employers must act quickly and decisively to manage the fallout, safeguard their operations, and mitigate further losses. Navigating the claims…
Multifactor authentication (MFA) is an integral component of cybersecurity. Requiring additional steps to access data makes information more secure and more challenging to steal. However,…
The construction industry is continuously moving toward digitization, adopting advanced technology such as artificial intelligence, the Internet of Things (IoT) and Building Information Modelling software.…
Evolving technology has significantly benefited organizations across industries, and the trucking sector is no exception. Communications and transport logistics can now be integrated through single…
October is National Cybersecurity Awareness Month. During this annual event, government and industry leaders worldwide come together to raise awareness about the importance of cybersecurity.…
Cyberattacks can impact a company in numerous ways. They can create significant financial losses through fines, lawsuits and business interruptions, and they can cause reputational…
Businesses of all sizes are susceptible to cyberattacks such as phishing scams, malware attacks and ransomware schemes, which can create significant financial loss and lead…
The cyber risk landscape is constantly evolving, with cybercriminals quick to exploit emerging technologies for malicious purposes. In response, businesses are exploring innovative methods to…
Social media is an essential marketing strategy for increasing brand awareness and connecting with consumers. However, using social networks increases an organization’s cyber risks. Furthermore,…
As the use of artificial intelligence (AI) and machine learning (ML) continues to grow, businesses that utilize these technologies must also be aware of cybercriminals’…
In what is being called “the most important cyber accumulation loss event since NotPetya,” the July 19, 2024, global technology outage will produce scores of…
An insider threat refers to an individual entrusted with access to or knowledge of an organization’s operational components, personnel, physical assets, networks, systems or technology.…
Cyber insurance, also referred to as cybersecurity insurance or cyber risk insurance, is a form of protection aimed at assisting organizations in managing risk exposure…
Cyber insurance claims in North America reached record levels in 2023, according to a report by insurance broker Marsh.Specifically, March received more than 1,800 cyber…
Cyber breaches can result in financial losses, regulatory penalties and reputational damage, significantly impacting an organization’s ability to do business. Fortunately, developing a comprehensive cybersecurity…
Several British Columbia (BC) libraries have been targeted by a ransomware attack, underscoring the importance of cyber hygiene measures for all types of organizations. On…
How organizations respond to cyber incidents can make or break their financial and reputational stability. In the event of a poor response, organizations may encounter…
Complex and high-tech hacking methods often attract significant attention. However, businesses must also remain vigilant against older, more straightforward tactics like shoulder surfing. This attack…
Formjacking is a cyberattack in which a threat actor injects malicious JavaScript into a website, often one that contains an online payment form. Once the…
Also known as IT security, cybersecurity refers to safeguarding internet-connected systems, critical data, and other digital assets from potential cyberthreats. These threats may exploit sensitive…
The rapid growth of artificial intelligence (AI) is reshaping industries and revolutionizing how people live and work. Its potential to propel scientific advances and bolster…
At a briefing on Friday, Feb. 2, 2024, Hong Kong police revealed that a recent cyber incident involving deepfake technology resulted in a finance professional…
In 2023, ransomware payments reached an unprecedented peak, with businesses paying over $1 billion USD to cybercriminals. This alarming statistic, reported by Chainalysis, underscores a…
Quick response (QR) codes are a popular marketing, sales, payment and customer service tool for several businesses. However, as QR codes have become more prevalent,…
More than half of organizations suffered a cyberattack or breach that prevented data access in 2023, and IT disruption has become commonplace, according to Dell…
Tailgating and piggybacking are low-tech tactics used by malicious actors to access restricted areas. They occur when an unauthorized individual gains physical access to a…
Social engineering refers to a cyberattack method in which a cybercriminal preys on key human behaviours (e.g., trust of authority, fear of conflict and promise…
In the rapidly evolving digital era, Canadian businesses face an increasing risk from cyber attacks and data breaches. Understanding what cyber insurance is, particularly in…
Cyber hygiene refers to habitual practices that ensure critical data and digital systems are handled safely and protected from cyberattacks. Cyber hygiene is increasingly vital…
Cloud-based services are rapidly growing. With new growth comes new challenges, and shadow IT is one area of concern. Shadow IT refers to the use…
Artificial intelligence (AI) has become increasingly popular in recent years, offering functions that simulate human intelligence. While AI technology offers numerous benevolent applications, cybercriminals can…
The advancement of artificial intelligence (AI) has created many opportunities for both individuals and organizations, but this technology may also help criminals develop new methods…