The Worst Time to Plan for a Breach? After One Has Already Occurred.

Your organization has been hit with a catastrophic ransomware attack. Most of the critical digital systems that your business needs in order to function—at the most basic level—are offline. Your CEO has received a ransom note demanding money. If no payment is sent, the attack will continue indefinitely, and the company may never regain access to much or all of the compromised data.

Continue reading…

Peanut Butter Budgeting for Cyber Security and Why It Doesn’t Work

The economics of cyber security are completely lopsided. There are a seemingly infinite number of cyber security risks out there, with more and more popping up every day. Hackers appear to have unlimited resources, and cybercriminals are literally reinvesting their lucrative profits into new and innovative ways to exploit, extort, and steal from your organization.

Continue reading…

How to practice safe Apps

Apps are awesome. I don’t need to tell you that. Just look at your phone or tablet or both. They probably have a boatload of Apps on them already.

I bet you have already installed many of the usual suspects such as Angry Birds, Instagram, Facebook, some sort of Twitter client, WhatsApp and maybe even a few work related ones like Evernote and DropBox. And of course if you’re good Canadian, you’re likely to have The Weather Network App installed! We take our weather seriously up here.

Continue reading…