fbpx

Back to All Blogs

PROLINK's PRO Tips & Tricks

Things our clients have asked about.

LATEST Privacy & Cyber Security POSTS

Graphic depicting security awareness training.

Security Awareness Training: What is it, Best Practices, & More

Human error is one of the leading causes of . According to , insider threats are now more common than external ones, with 4 of the top 6 risks caused ...

July 4, 2022

Tech Firms & Bug Bounty Hunters: Where does your liability end?

The last few years have seen the rise of bug bounty hunters: security researchers who find software bugs for a fee, rather than exploiting them. Most ...

May 27, 2022

Encryption Basics: What is it, Best Practices, & More

Hackers are more aggressive than ever. Traditionally, cybercriminals would only encrypt data before seeking a ransom. But in a move popularized by the...

May 16, 2022

Which healthcare privacy laws apply to my practice?

In a digital age, more and more healthcare services are moving online. From electronic patient logs to virtual counselling to an increasing array of m...

March 21, 2022

Privacy Breaches: Why Social Workers are Vulnerable and What You Can Do About It

In a digital age, more and more health care services are moving online. From electronic patient logs to virtual counselling and an increasing array of...

March 5, 2022

Is Your Household Cyber-Safe?

As our lives become increasingly digital, it’s more important than ever to make sure that your household is protected from cyberattack. Cybercrime a...

February 24, 2022

Multi-Factor Authentication: Why Passwords Aren’t Enough Anymore

Poor password habits are one of the biggest threats to organizational security. Why? Hackers know that most employees tend to reuse generic, easy-to-g...

February 18, 2022

Healthcare Professionals are most vulnerable to a data breach. Why?

The health sector has long been a frequent and favoured target of attackers. And with the transition to virtual care, cybercrime against healthcare pr...

February 8, 2022

May Contain Traces of Log4j: Risk Management Strategies for Tech Firms

It’s only been a month and experts are already calling the Log4j vulnerability one of the . Given the prevalence of Log4j software, it’s impossibl...

January 25, 2022


    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Generic filters
      Exact matches only