angle-leftangle-rightangle-uparrow-circle-leftarrow-circle-rightarrow-downarrow-downarrow-rightbarscheck-orangecheck-whitecheckchevron-circle-leftchevron-circle-rightchevron-leftchevron-rightclock-invertclockenvelopefacebook-squarefacebookflaggithub-altgithub-squaregoogle-plus-squaregoogle-plusheadsetheadset_psexportinstagramlinkedin-squarelinkedinlocation-pinlocation-pin_psexportnav-arrowpinterest-ppinterest-squareplus-blueplus-grayright-arrowrss-squarersssearch-whitesearchtimes-circle-otwitter-squaretwitterup-angleyoutube-squareyoutube

Vital Components to Equip Your Organization for Breach Readiness 3 – Protecting your Assets

By: Marissa Rodriguez This is Part 3 in a series of Breach Response Components to equip your organization. To read the full series, visit Part 1, Part 2, Part 4 and Part 5. Where Do You Begin? Let’s pretend your company experienced a data breach with millions of records exposed. Your company is frantically trying […]

Vital Components to Equip Your Organization for Breach Readiness 2- Effective Communication Tactics

By: Marissa Rodriguez This is Part 2 in a series of Breach Response Components to equip your organization. To read the full series, visit Part 1, Part 3, Part 4, and Part 5. Your communications set the tone with internal and external stakeholders after a data breach occurs, so you need to get them right. […]

Vital Components to Equip Your Organization for Breach Readiness

By Marissa Rodriguez To date, 975 breaches have occurred this year resulting in over 19 million records exposed. These numbers demonstrate necessity of breach readiness – it’s not a matter of if a data breach will happen to you, but when. What’s more, these breaches can have a long-term impact on companies. On average,immediately after […]

New Canadian Data Breach Regulation Could Change How Businesses Approach Cyber Security

The 2017 Scalar Security Study – The Cyber Security Readiness of Canadian Organizations by Scalar Decisions, Inc., found a 44% increase in the average number of cyber-attacks against small and medium-sized business in Canada since 2014. Historically, Canadian regulations left it up to businesses to decide whether or not they reported data breaches publicly. Over […]

Safe Email Handling Tips for Businesses

Email is a common target for malicious hackers. Two of the more common techniques they use to compromise email are business email compromise and malicious document attachments. Business Email Compromise  The FBI describes Business Email Compromise, or BEC, as a financially-motivated and often sophisticated scam carried out by organized crime organizations. The technique involves impersonating […]