Apple, Amazon, and Google recently changed their policies after privacy concerns were raised
Voice assistants have revolutionized the industry when it comes to having an extra set of digital hands in our home or office. Privacy was always the forefront of this and many sci-fi spinoffs were made to make us even more paranoid of our soon to be robot overlords.
Because your privacy matters
There have...
In this podcast, you will hear some of the reasons why you and your business must be cyber aware in today's world. Even if you are running a small business, Darnley talks about the importance of having the right mindset while proactively keeping your pencil sharp to mitigate these risks.
...
Stolen data includes names, addresses, phone numbers, and credit scores.
CapitalOne infrastructure breach
Capital One disclosed on Monday that personal information - including names, addresses, phone numbers, and credit scores - 100 million individuals in the USA and six million people in Canada were obtained by the Seattle hacker. Approximately one million social insurance numbers of Canadian credit card customers were also stolen.
According to court documents, a...
What is Cryptojacking?
Cryptojacking is the secret use of your computing device to mine cryptocurrency.
How it is utilized?
Cryptojacking or cryptocurrency mining works by websites running hidden mining scripts in your browser without your knowledge/consent. They mine by using your computer's processor to earn money for someone else. Your machine may get hot, loud, and slow.
How Do I Protect My Business?
I always suggest keeping your browser up...
Every Canadian business must adhere to Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) – any organization that collects, uses or discloses personal information must ensure they’re ready to comply with the privacy act’s new mandatory data breach response requirements as of November 1, 2018 or face non-compliance consequences.
This question I constantly ask prospects which usually get a response of “I believe so” or “We have someone who looks after that”.
As the number of people that have devices connect, the risk and impact of data breaches from malicious cyber attacks, system failures, and human failures will only continue to increase.
What is trust? As human beings, we have the tendency to trust others, even if we like to think so or not. In the new digital age of social engineering, the attacks are going beyond your typical obvious looking phishing attacks with fake company logos, fake help desk phone calls – however, more sophisticated attacks are emerging that go beyond amateur means.
According to Microsoft Secure Blog The Emerging Era of Cyber Defense and Cybercrime, by the year 2020 the world will need to cyber defend 50 times more data than it does at the present day. The World Economic Form recognized cyber risk as one of the top commercial risks facing the world today.
When it comes to your organization’s protection against cyber-crime, there are many questions that can be asked to assess your vulnerabilities. Regardless of your company size or field – these vulnerabilities directly affect each and every one of you in ways you may not even realize.