fbpx

Category Tag: Manage Risk

From Promises to Perils: Tips to Navigate AI’s Double-Edged Sword

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="31439" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] As the tech landscape evolves at lightning speed, artificial intelligence is turning the business world upside down. But with this AI revolution comes…

Mitigating AI Risks: Tips for Tech Firms in a Rapidly Changing Landscape

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="30288" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner offset="vc_col-xs-6"][vc_column_text]Key Risks Best Practices[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The business world is undergoing a rapid transformation as we enter the age of AI. Tech firms are leading…

Hacking the Hackers: Cyber Scanning 101

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="29576" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] The cyber landscape is complex and ever-evolving—and hackers show no signs of slowing down. As new technologies emerge, criminals are constantly adapting their…

How do I report a breach under PHIPA?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25691" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Overview of PHIPA Breach Reporting Requirements Offences Under PHIPA[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The number of records stored online continues to grow every day, and with…

Protecting Patient Data: Your Guide to Ontario’s PHIPA

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25368" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Overview of PHIPA HICs and Agents Offences Under PHIPA Amendments to PHIPA[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] From medical histories to social security numbers to banking information,…

Offline Backups: Pros, Cons, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25064" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's an offline backup? Why are offline backups effective? Who needs an offline backup?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Are there any drawbacks? How do I…

Graphic depicting security awareness training.

Security Awareness Training: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24522" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is security awareness training? Why is security awareness training effective? Who needs security awareness training?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I implement security…

Tech Firms & Bug Bounty Hunters: Where does your liability end?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24699" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How am I liable? What can I do about it?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The last few years have seen the rise of bug bounty hunters:…

Encryption Basics: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24591" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is encryption? Why is encryption effective? What's "data at rest" and "data in transit"?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I protect data at…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Generic filters
      Exact matches only