fbpx

Category Tag: Understand Risk

Which healthcare privacy laws apply to my practice?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24550" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? What's personal health information? What are Canada's healthcare privacy laws? Which laws apply to my practice?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2"][vc_column_text]What are…

Privacy Breaches: Why Social Workers are Vulnerable and What You Can Do About It

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24593" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? Why are Social Workers at risk? What are the effects? How can Social Workers protect PHI?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] In a digital…

Healthcare Professionals are most vulnerable to a data breach. Why?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24597" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner offset="vc_col-xs-6"][vc_column_text]What's a privacy breach? Why are Healthcare Professionals at risk? What are the effects? How can Healthcare Professionals protect PHI?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The health sector…

Why Experts are Calling Log4j the Worst Security Flaw of the Decade and Why You Should Care

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24601" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What's Log4j? What's the Log4j vulnerability? What's the impact?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What does the future hold? Best Practices[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The Log4j vulnerability sent shockwaves…

Graphic showing the consequences of a cyberattack

The Consequences of a Breach: Can your business survive a cyberattack?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21208" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Regulatory Violations Financial Loss Legal Action[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Operational Disruptions Reputational Harm The Bottom Line[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] Capital One, Microsoft, Marriott, and more—cyberattacks on major companies…

Graphic depicting ransomware attacks

Surviving the Other Pandemic: What’s Ransomware, Who’s at Risk, and Why?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21012" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is ransomware? Why is ransomware so common? How has COVID-19 affected ransomware?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do attackers gain access? Who’s at risk (and…

Graphic showing a cyber secured work device

Privacy Law Update: Are you ready for privacy law reforms?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="20240" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Current Privacy Laws DCIA Proposed Changes DCIA & Privacy Breach Reporting DCIA & Businesses[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is DCIA 2020? DCIA & Other…

Graphic of a business protected from cyber threats

All About PIPEDA: How do privacy laws affect my business?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="20233" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How is Consumer Data Protected? Private Health Information Experiencing a Privacy Breach Breach Reporting[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Where does PIPEDA apply? Laws Applying to…

Graphic of Top 10 Cyber Risk Trends 2021

Cyber Risk Trends 2021: 10 Threats to Watch Out For

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2" css=".vc_custom_1605808800669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 10% !important;padding-bottom: 5% !important;}" offset="vc_hidden-xs"][vc_row_inner][vc_column_inner width="1/2"][vc_column_text]Prevalent Attack Methods Top Uses of Stolen Data COVID-19 and Cyber Risks[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2"][vc_column_text]Looking Ahead What Can Businesses Do? How Can PROLINK…

Graphic of a professional working remotely

The Top 6 Remote Work Security Concerns

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2" css=".vc_custom_1607104432217{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 10% !important;padding-bottom: 5% !important;}" offset="vc_hidden-xs"][vc_column_text]Remote Work's Biggest Challenges The Work From Home Forecast What Can Businesses Do? COVID-19 has drastically redefined how, when, and where work…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Search
      Generic filters
      Exact matches only