fbpx

Category Archives: Privacy & Cyber Security

Protecting Patient Data: Your Guide to Ontario’s PHIPA

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25368" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Overview of PHIPA HICs and Agents Offences Under PHIPA Amendments to PHIPA[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] From medical histories to social security numbers to banking information,…

Offline Backups: Pros, Cons, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25064" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's an offline backup? Why are offline backups effective? Who needs an offline backup?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Are there any drawbacks? How do I…

When should you report a cyber incident?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25048" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Common Claims Scenarios When should I report an incident? Best Practices for Reporting[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] So you’ve had a cyber incident. Maybe you’ve found…

Graphic depicting security awareness training.

Security Awareness Training: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24522" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is security awareness training? Why is security awareness training effective? Who needs security awareness training?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I implement security…

Tech Firms & Bug Bounty Hunters: Where does your liability end?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24699" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How am I liable? What can I do about it?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The last few years have seen the rise of bug bounty hunters:…

Encryption Basics: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24591" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is encryption? Why is encryption effective? What's "data at rest" and "data in transit"?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I protect data at…

Which healthcare privacy laws apply to my practice?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24550" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? What's personal health information? What are Canada's healthcare privacy laws? Which laws apply to my practice?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2"][vc_column_text]What are…

Privacy Breaches: Why Social Workers are Vulnerable and What You Can Do About It

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24593" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? Why are Social Workers at risk? What are the effects? How can Social Workers protect PHI?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] In a digital…

Is Your Household Cyber-Safe?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24583" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Do you have social media? Do you shop online?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Do you have a personal device? Are your children active online?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] As our…

Multi-Factor Authentication: Why Passwords Aren’t Enough Anymore

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25052" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Why aren't passwords enough? What's multi-factor authentication? Why is MFA effective? What's 2FA?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]When should I use MFA? How do I…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Search
      Generic filters
      Exact matches only