Threats exist both at home and abroad.
It is important to ensure you are doing everything in your power to protect your organization from the potential damage.
Peter Nguyen via Getty Images
Trump keeps downplaying accusations that Russia interfered in the last U.S. election.
JGI/Tom Grill via Getty Images
Is it safe to go online after two major ransomware attacks in as many months? I would bet many would say, 'you've got to be kidding.' Some folks might already be curbing what they do on the Web. Howev...
Zephyr18 via Getty Images
I'm willing to bet that the person involved in the email confrontation was not aware that she was being unfair, humiliating, potentially malicious or vindictive. I'm willing to bet that these people thought they were handing the situation clearly and in a businesslike manner. That was not the case.
scyther5 via Getty Images
While the damage of WannaCry seems to have been limited by a "kill-switch" discovered by British computer expert, Marcus Hutchins, security experts warn that new versions of WannaCry could still proliferate. All of which begs the question: How can Canadian businesses protect themselves against falling victim to the next worldwide ransomware attack? Here are a few suggestions:
Paul White/AP via CP
Criminals take the path of least resistance. The weakest link is the employee. Data breaches are mostly the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report. The best way for organizations to protect themselves is to create and foster a culture of cyber security awareness.
Pawel Kopczynski / Reuters
"This one wasn't really a targeted attack at all."
IvanC7 via Getty Images
As a mom, I've seen my children share everything with friends, including passwords. Hyper-sharing is part of their lives, where privacy and digital barriers are not a concern. But from an outsider's perspective -- especially a parent's -- the risks are evident. I've seen firsthand how this hyper-sharing can cause trouble when friendships end. This is one of the things that moms need to worry about today that they did not 20 years ago - keeping their children cyber safe.
weerapatkiatdumrong via Getty Images
Let’s be real -- there’s nothing better than finding out a restaurant, café, or clothing store offers free Wi-Fi. Getting online quickly, easily and for free is a simple way to feel connected to our friends, coworkers, and our favourite brands. It’s the little things that make us feel valued.
KrulUA via Getty Images
It's hard to imagine life without the Internet. Browsing the web has become so second nature to us that we share sensitive information through our e-mails and social media accounts each day without se...
Dean Mitchell via Getty Images
While Canadian ISPs cannot share customer information without their consent, Canadians regularly travel to the US and use WIFI or cellular data on electronic devices and computers. In cases where they use cellular data or WIFI via American ISPs, their personal information may be accessible. Selling customer data to third parties is how Google and Facebook make money. However, information collected by an ISP is much more detailed than what Facebook and Google collect.
PeopleImages via Getty Images
As a personal finance expert I know how important security is. You can spend years saving wisely, only to be duped by a savvy fraudster. Read about all of that in the Little Book of Scams provided by the government of Canada. It outlines all the latest ways fraudsters are trying to get their hands on your information.
bestdesigns via Getty Images
Cybercrime and significant breaches have plagued various sectors in the past five years in financial, retail, healthcare, entertainment, and government. For many, 2016 will go down as the year that computer hackers affected the outcome of the U.S. presidential election.
weerapatkiatdumrong via Getty Images
With a new year well underway, we are all becoming more comfortable dating our paperwork "2017." Last year was a wild one and to many people's dismay it brought about some changes that will continue t...
scyther5 via Getty Images
Five ways to detect a cyber attack. From the AOL Partner Studio
Adam Gault via Getty Images
The health care industry is unique. Highly regulated, highly specialized, and in possession of highly confidential information, it's a natural target for cyber-attacks. With the rise of internet-connected devices and the industry lagging behind modern cyber security, now more than ever IT decision-makers in health care need to think about how to best protect patient information in the modern threat landscape.
Carlos Barria / Reuters
The best ways to protect your small business from cyber attacks. From the AOL Partner Studio
CC0 Public Domain
"I'll tell you what, no computer is safe."
Peter Dazeley via Getty Images
Data loss is a fact of life today for organizations. Data loss is caused for a range of reasons including human error, natural disaster, equipment failure and a cyber attacks to name a few. For solution providers, several 2017 trends show that backup and recovery options will be top of mind for small, medium and larger businesses.
mattjeacock via Getty Images
Stories of increasingly vicious cyber-attacks have dominated the headlines this year. It seems like every day we wake up to news of another attack on the scale of the Yahoo data breach, the Democratic National Committee hack, or the NSA source code leak.
Shutterstock / Rehan Qureshi
The popular myth for a non-profit organization executive is to ask, "Why anyone would want to hack us?" The nefarious nature makes non-profits easy targets because they often invest less in employee training and IT security.
Choreograph via Getty Images
When we consider the range of cyber-threats, we generally imagine external attackers -- foreign states, criminal underworlds or lone script kiddies. But the reality is that a large proportion of vulnerabilities and "threats" that organizations face today come from legitimate network users.
Tom Merton via Getty Images
The full value of big data will only be realized when organizations approach it in a manner that places personal privacy at the forefront. So, if we want to unlock the positive potential of big data, we need to approach it in a way that simultaneously fosters innovations that will help our society and mitigates risks associated with using data in new and different ways.
If anything, the modern threat landscape encourages attacks on small, vulnerable businesses. And 60 per cent of the time, those small businesses will go under within six months of a cyber-attack. So while massive data breaches dominate the news, they only scratch the surface.
Lane Oatey / Blue Jean Images via Getty Images
The evidence clearly points to the need for Canadian SMBs to increase their awareness of threats and ability to detect them, especially as they look to grow. Keeping these points in mind, there is always room for improvements in cyber policies and procedures, product selection and education because it doesn't look like cyber threats will be subsiding in the near future.
UberImages via Getty Images
Corporate security and travel professionals are expected to continuously learn, adapt to new technologies and find best practices that safeguard the security and privacy of employee travellers. Companies can follow five best practices to effectively keep monitor, assist and protect personnel and their data while travelling.
BRENDAN SMIALOWSKI via Getty Images
Navigating safe online behaviour has become a huge concern for parents of kids today, as they try to find the balance between allowing their children to access online information for fun and for educational reasons, while protecting them from being taken advantage of by sexual predators and other online risks, from a very early age.
In 2015, 205 billion email messages were sent and received daily, according to the Radicati Group. Messages are sent and received from computers, mobile, tablets and many other devices. The current U.S. election has seen Hillary Clinton's presidential race mired in an email scandal involving the user of a personal email server while she served as secretary of state from 2009 to 2013.
This primer is the "two-bite brownie" response to online safety, or "cybersecurity." A security fanatic could write a few books on this topic, but this is what you need to know to cut out most of the risks online (making it safer than crossing the street).
BILL HINTON VIA GETTY IMAGES
Growing up before the age of the internet and social networks has left many older users unaware and unprepared for risks looming in the virtual world. From that perspective, children today are lucky to have exposure to the best cybersecurity practices, such as keeping good password hygiene. For those not as familiar with the dos and don'ts, fear not -- here are the password essentials for both young and old.
Earlier this year, a group of cyber criminals targeted two Canadian financial institutions with a hybrid type of malware, GozNym. The first time GozNym was ever seen, it stole millions of dollars from the unnamed Canadian financial institutions along with several U.S. banks.