Malicious emails can lead to data breaches and ransomware attacks Malicious emails are a significant cybersecurity risk for many organizations. Email remains an important communication method for most organizations even though personal communication is migrating more to text, Facebook Messenger, LinkedIn Message, WhatsApp and various Asian apps. However, organizations continue to receive malicious emails that…
Unless you’re a high-profile celebrity or a golfing buddy of someone like Jeff Bezos, your risk of an attack is very low The Apple FaceTime software defect triggered a much bigger question about the widespread invasion of privacy enabled by iPhones. Many wanted to know if their conversations were being recorded and relayed by various…
Political parties’ fixation on analytics poses a threat to your personal information In the olden days, there were lots of ways to disrupt elections. In at least one Canadian jurisdiction, gifts would be waiting for you outside the polling place. That’s disruption. One of the first national elections I covered was in the days when…
And how to evade them The newest research by NordVPN shows that Canadian websites have 16.4 trackers on average. This is the eighth biggest result out of the 20 countries studied. Streaming websites in Canada have even more – 25 trackers on average. Next come health websites with 23 trackers per website. Digital media sites…
Cyber vulnerability is humanity’s contemporary Achilles heel
The Greek Scientists Society recently invited me to speak at their inaugural international virtual conference on “Cybersecurity and the New Global Economy of the 21st Century”. Cybersecurity is clearly top of mind these days for individuals, civil society, businesses, financial institutions, and governments at all levels. The Greek Scientist Society was founded two years ago…
Four steps to reduce the risk of cybersecurity incidents adversely impacting your organization’s future
Cybersecurity lapses continue to make headlines and undermine the fiscal health and reputation of the targeted organizations. Executives are under constant pressure to accommodate all the demands made on them. Providing a little leadership on cybersecurity doesn’t fit well on the to-do list. Meetings with IT specialists often frustrate executives for one or more of…
The average data breach cost to Canadian firms studied hit $7 million
With Cyber Security Awareness Month almost upon us, I thought it might be helpful for executives to see an actionable list of topics to ask their techies about. Reasonable answers will build your confidence that your organization’s risk of a cyber security breach is being sensibly addressed. The average data breach cost to Canadian firms studied…
The signs you've been hacked and how to minimize the risk
Hackers try to hide their activities and hope you won’t notice when they steal your identity and your data from your smartphone. Here are the more frequent signs that you’re being hacked and how to minimize the risk or thwart the attack. Unsecure Wi-Fi Wi-Fi in public places, such as cafes or stores, is often…
How many breaches must we read about before we take action to protect our customer information?
I’m astonished that major data breach stories are still occurring and generating unnerving headlines. How many of these instances do we have to read about before we finally take at least basic action to protect our customer information? As a result of an attack, adult dating and pornography website company FriendFinder Networks exposed the personal…
October is Cyber Security Awareness Month. But don't wait until then to incorporate security measures
Phishing has evolved into the most effective social engineering attack hackers use to infiltrate organizations. Phishing aims to con employees into unknowingly downloading malware or revealing their access credentials. The best defence is our individual vigilance. Phishing.org defines phishing as “a cybercrime in which a target or targets are contacted by email, telephone or text…