At Least Public Organizations are Transparent About their Cyber Challenges

At Least Public Organizations are Transparent About their Cyber Challenges

As part of a rapid fire succession of TV interviews earlier this week, I had the opportunity to read a 12-page report prepared for the board of directors of the Toronto Public Library following the security breach that devastated IT operations, affected more than 100 branches, compromised the personal information of employees going back to…

Cyber Threats or Media Sensation? Debunking the ‘Cyber-Kidnapping’ Phenomenon

Cyber Threats or Media Sensation? Debunking the ‘Cyber-Kidnapping’ Phenomenon

The so-called “cyber-kidnapping” trend targeting immigrant and Asian families is not a new phenomenon, but rather a calculated exploitation of human nature by organized criminals. Amidst headlines exploiting fear, uncertainty, and doubt, it’s crucial to recognize the use of buzzwords and alarming narratives, as indulging in sensationalism poses a risk to our trust, privacy, and security.

8 Sentences Regarding Google’s Facial Data Collection

8 Sentences Regarding Google’s Facial Data Collection

Unveiling a disconcerting initiative, Google is actively gathering intricate details like eyelid shape and skin tone from children through videos submitted by parents. In an eyebrow-raising collaboration, TELUS incentivizes parents with $50 to film their children wearing various props, contributing to Google’s Project that involves facial geometry collection and identification verification.

MOVEit Breach Aftermath: A $65 Billion Wake-up Call

MOVEit Breach Aftermath: A $65 Billion Wake-up Call

Just a year after the World Economic Forum’s warning, the MOVEit breach unfolded, exposing vulnerabilities in cloud security. With over 2600 companies affected and losses exceeding $65 billion, this underscores the urgency for stringent vendor risk management and transparency standards in the cloud industry.

Do Data Aggregators Have a Higher Responsibility to Data Protection?

Do Data Aggregators Have a Higher Responsibility to Data Protection?

Unsurprisingly, aggregators of financial data are a major target of cybercrime. Some mortgage lenders and brokers have taken steps to invest in security detection and incident response capabilities, but there are key lessons to be learned from each and every data breach. These include: 1. Attackers can steal millions of personal identities in just a…

Is It Time for Organized Cybercrime Reform?

Is It Time for Organized Cybercrime Reform?

As reputable outlets* breathlessly peg the global impact of cybercrime in the trillions of dollars, the reality is that the bulk of the business comes from strong-arming victims using ransomware. As recently as a decade ago, cyber-extortionists saw themselves as modern-day Robin Hoods, who merely appropriated the surplus of bloated, negligent capitalists in an effort…

Why Critical Thinking and Disinformation Should Be Taught In Schools

Why Critical Thinking and Disinformation Should Be Taught In Schools

I’m old enough to remember someone saying it would be a good idea to connect lots of personal computers together… Call it internetworking if you will. Today, accessible information sharing comes with the downside of some of it being spectacularly wrong. But misinformation is not as impactful a problem as the deliberate corruption of narratives…

Have We Reached The Cybersecurity Saturation Point? You bet!

Have We Reached The Cybersecurity Saturation Point? You bet!

The modern world has adopted digital connectivity and willingly transitioned to a state of technology dependence faster and more thoroughly than ever before. The sheer volume of new product that passes for innovation these days has marketers struggling to come up for actionable phrases synonymous with ‘upgrade now because, well, it’s just better, okay!’. With…