fbpx

Category Tag: Manage Risk

Hacking the Hackers: Cyber Scanning 101

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="28492" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] The cyber landscape is complex and ever-evolving—and hackers show no signs of slowing down. As new technologies emerge, criminals are constantly adapting their…

How do I report a breach under PHIPA?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25691" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Overview of PHIPA Breach Reporting Requirements Offences Under PHIPA[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The number of records stored online continues to grow every day, and with…

Protecting Patient Data: Your Guide to Ontario’s PHIPA

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25368" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Overview of PHIPA HICs and Agents Offences Under PHIPA Amendments to PHIPA[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] From medical histories to social security numbers to banking information,…

Offline Backups: Pros, Cons, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25064" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's an offline backup? Why are offline backups effective? Who needs an offline backup?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Are there any drawbacks? How do I…

Graphic depicting security awareness training.

Security Awareness Training: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24522" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is security awareness training? Why is security awareness training effective? Who needs security awareness training?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I implement security…

Tech Firms & Bug Bounty Hunters: Where does your liability end?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24699" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How am I liable? What can I do about it?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The last few years have seen the rise of bug bounty hunters:…

Encryption Basics: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24591" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is encryption? Why is encryption effective? What's "data at rest" and "data in transit"?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I protect data at…

Multi-Factor Authentication: Why Passwords Aren’t Enough Anymore

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25052" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Why aren't passwords enough? What's multi-factor authentication? Why is MFA effective? What's 2FA?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]When should I use MFA? How do I…

May Contain Traces of Log4j: Risk Management Strategies for Tech Firms

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24603" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] It’s only been a month and experts are already calling the Log4j vulnerability one of the greatest security disasters of our time. Given the…

Graphic of tips for preventing ransomware

Prepare Now or Pay Later: How Can Businesses Mitigate the Risk of Ransomware?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21078" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] The pandemic and ensuing digital revolution has fuelled an outbreak of ransomware in recent years, a malicious software that infiltrates systems, encrypts data, and…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Generic filters
      Exact matches only