fbpx

Category Archives: Privacy & Cyber Security

Graphic depicting encryption.

Encryption Basics: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="23918" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is encryption? Why is encryption effective? What's "data at rest" and "data in transit"?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I protect data at…

Graphic presenting health records.

Protecting Patient Data: What Healthcare Professionals Should Know

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="23230" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? What's personal health information? What are Canada's healthcare privacy laws? Which laws apply to my practice?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2"][vc_column_text]What are…

Graphic depicting a privacy breach.

Privacy Breaches: Why Social Workers are Vulnerable and What You Can Do About It

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="23155" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? Why are Social Workers at risk? What are the effects? How can Social Workers protect PHI?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] In a digital…

Graphic depicting a family using personal devices.

Is Your Household Cyber-Safe?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="23085" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Do you have social media? Do you shop online?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Do you have a personal device? Are your children active online?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] As our…

Graphic depicting multi-factor authentication.

Multi-Factor Authentication: Why Passwords Aren’t Enough Anymore

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="22920" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Why aren't passwords enough? What's multi-factor authentication? Why is MFA effective? What's 2FA?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]When should I use MFA? How do I…

Graphic depicts virtual counselling.

Healthcare Professionals are most vulnerable to a data breach. Why?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="22663" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? Why are Healthcare Professionals at risk? What are the effects? How can Healthcare Professionals protect PHI?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The health sector…

Graphic depicting a computer virus.

May Contain Traces of Log4j: Risk Management Strategies for Tech Firms

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="22472" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] It’s only been a month and experts are already calling the Log4j vulnerability one of the greatest security disasters of our time. Given the…

Graphic presenting an error message.

Why Experts are Calling Log4j the Worst Security Flaw of the Decade and Why You Should Care

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="22403" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's Log4j? What's the Log4j vulnerability? What's the impact?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What does the future hold? Best Practices[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The Log4j vulnerability sent shockwaves…

Graphic showing the consequences of a cyberattack

The Consequences of a Breach: Can your business survive a cyberattack?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21208" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Regulatory Violations Financial Loss Legal Action[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Operational Disruptions Reputational Harm The Bottom Line[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text]Capital One, Microsoft, Marriott, and more—cyberattacks on major companies seem…

Graphic of tips for preventing ransomware

Prepare Now or Pay Later: How Can Businesses Mitigate the Risk of Ransomware?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21078" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text]The outbreak of COVID-19 and ensuing digital revolution has fuelled an outbreak of ransomware, a malicious software that infiltrates systems, encrypts data, and disables user…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Search
      Generic filters
      Exact matches only