Deepfakes are sophisticated forgeries of an image, video or audio recording using artificial intelligence (AI). As technology has evolved, deepfakes are now able to alter…
As the construction industry continues to increase its use of technology, the risks of cyberattacks also rise. Furthermore, certain aspects of the construction industry make…
Weekly cyberattacks have increased by 8% globally compared to a year ago, according to a Cyber Attack Report by software company Check Point. Specifically, the…
During an economic slowdown, businesses often experience decreased sales and profit margins stemming from changing consumer behaviours, prompting them to reduce spending to avoid issues…
Allianz’s 2023 risk barometer reported that cyber incidents topped the list of risks facing businesses worldwide in 2023 for the second year, making thorough staff…
Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach…
At some point, all software will reach the end of its life. This means manufacturers will no longer develop or service the product, discontinuing all…
Traditional cyber-security protocols often can’t keep up with the rapidly evolving nature of modern workplaces. In particular, the complexity of hybrid work arrangements, the rising…
Cyberespionage is a type of cyberattack that involves an unauthorized user (or multiple users) accessing a victim’s sensitive information in order to secure economic benefits,…
Cyber incidents topped the list of risks facing businesses around the world in 2023 for the second year in a row, according to Allianz’s 2023…
Cyberattacks continue to occur frequently across various industries. In fact, nearly 1 in 4 (24%) IT professionals reported that their organization fell victim to a…
Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors security-related threat information and endpoint data to detect and respond to ransomware and…
Most homes and offices have a router that provides internet access to multiple devices within the same space. Unfortunately, cybercriminals may target routers because they…
A distributed denial-of-service (DDoS) cyberattack is a cybercriminal’s attempt to interrupt an online service by flooding it with fake traffic. This can be achieved by…
Cyber Security Awareness month happens in October each year. It is a national public awareness campaign intended to help educate Canadians about the importance of…
Cybercriminals are constantly developing new techniques to target and attack unsuspecting victims. One of these more recent methods is voice phishing, more commonly known as…
Most organizations rely on the internet to conduct everyday business. This reliance has increased in recent years due to the COVID-19 pandemic, which enabled Canadians…
Now that many COVID-19 restrictions are being lifted, more employees are travelling again. Business travel provides many opportunities and benefits, but organizations face heightened cybersecurity…
Helpful tips for keeping your identity and company data safe Did you know the average Internet user has 25 accounts to maintain? Despite this, people…
Ikea Canada recently experienced an internal data breach that exposed the data of 95,000 Canadians. The breach took place March 1-3 when an Ikea employee…
As cyberattacks become more frequent and severe, it is increasingly important for organizations to practise good cyber hygiene to minimize their exposure to risk. Cyber…
Work environments have changed rapidly due to the COVID-19 pandemic. Now, around 5 million Canadians are working at home instead of at their workplace. This…
Organizations face heightened cybersecurity risks when their employees travel. Business travellers are prime targets for cybercriminals, as they often carry valuable data and may not…
Most businesses and individuals are familiar with phishing, a cyberattack technique that entails cybercriminals leveraging fraudulent emails to manipulate recipients into sharing sensitive information, clicking…
High-profile cyberattacks at large companies have generated national headlines and raised awareness for the growing threat of cybercrime. Despite these attacks, almost half of Canadian…
A quarter of Canadian businesses say they experienced a cyberattack in 2021, according to a 2022 survey commissioned by technology firm NOVIPRO. Of those businesses,…
Keeping workplace technology up and running is vital to any organization’s success. While this task seems feasible, it’s growing harder and harder each year as…
Each year, cybercriminals get smarter and find new ways to get personal information from online users. A common method cybercriminals use is phishing campaigns. Phishing…
Unlike physical threats that prompt immediate action—like stopping, dropping and rolling if you catch on fire—cyber threats are often difficult to identify and understand. Cyber…
Ransomware threats happen when an attacker plants malware on a system that encrypts all the files, making the system useless. Then the attacker offers to…
Tech Insurance Terms to Know Technology companies own valuable intangible assets, such as sensitive data, software and intellectual property, which a general liability policy doesn’t…
Understanding and Preventing Data Breaches What do Kroger Co., Best Buy Canada, AbeBooks and major U.S. banks and credit card issuers like Barclays Bank and…
Cybercrimes are becoming an increasing threat to organizations. There are even various types of cyberattacks to be aware of now, such as cryptojacking. Cryptojacking is…
Email has become a critical part of everyday business, from internal management to direct customer support. The benefits associated with email as a primary business…
As a relatively new financial service, mobile payments have the potential to significantly change how consumers buy and sell goods using their phones, tablets and…
All companies should develop and maintain clear and robust policies for safeguarding critical business data and sensitive information, protecting their reputations and discouraging inappropriate behaviour…
Organizations today are under constant threat of cyberattacks as technology continues to evolve rapidly. Cybersecurity threats can not only compromise an organization’s data, but they…
As the fifth generation (5G) mobile network becomes increasingly accessible, cybersecurity risks also increase. While 5G has many benefits—including more reliability, massive network capacity and…
Remote Working Burnout a Factor in Security Risk Human error is one of the largest threats to the cybersecurity of an organization. As remote work…
As technology becomes increasingly important for successful business operations, the value of a strong cyber liability insurance policy continues to grow. The continued rise in…