At Least Public Organizations are Transparent About their Cyber Challenges

At Least Public Organizations are Transparent About their Cyber Challenges

As part of a rapid fire succession of TV interviews earlier this week, I had the opportunity to read a 12-page report prepared for the board of directors of the Toronto Public Library following the security breach that devastated IT operations, affected more than 100 branches, compromised the personal information of employees going back to…

Healthcare Cybersecurity Compliance Reform May be Tied to Funding

Healthcare Cybersecurity Compliance Reform May be Tied to Funding

In the ongoing discourse about HIPAA reform, opinions diverge on the efficacy of attaching conditions to financial and incident response assistance. While the need for enhanced cybersecurity in healthcare is universally acknowledged, the debate persists over whether such conditions send the right message or inadvertently complicate the imperative task of fortifying the sector’s defenses.

What Hidden Societal Impacts Await with the “Scourge of Ransomware”?

What Hidden Societal Impacts Await with the “Scourge of Ransomware”?

Our latest Media Cybersecurity Briefing applauds the Royal United Services Institute and the National Cyber Security Centre for exposing the layered harms caused by ransomware. This paper, often overlooked, serves as a vital anchor for journalists, urging a deep dive into the shocking consequences of extortion and shedding light on the real societal impacts beyond the monetary losses.

Cyber Threats or Media Sensation? Debunking the ‘Cyber-Kidnapping’ Phenomenon

Cyber Threats or Media Sensation? Debunking the ‘Cyber-Kidnapping’ Phenomenon

The so-called “cyber-kidnapping” trend targeting immigrant and Asian families is not a new phenomenon, but rather a calculated exploitation of human nature by organized criminals. Amidst headlines exploiting fear, uncertainty, and doubt, it’s crucial to recognize the use of buzzwords and alarming narratives, as indulging in sensationalism poses a risk to our trust, privacy, and security.

8 Sentences Regarding Google’s Facial Data Collection

8 Sentences Regarding Google’s Facial Data Collection

Unveiling a disconcerting initiative, Google is actively gathering intricate details like eyelid shape and skin tone from children through videos submitted by parents. In an eyebrow-raising collaboration, TELUS incentivizes parents with $50 to film their children wearing various props, contributing to Google’s Project that involves facial geometry collection and identification verification.

MOVEit Breach Aftermath: A $65 Billion Wake-up Call

MOVEit Breach Aftermath: A $65 Billion Wake-up Call

Just a year after the World Economic Forum’s warning, the MOVEit breach unfolded, exposing vulnerabilities in cloud security. With over 2600 companies affected and losses exceeding $65 billion, this underscores the urgency for stringent vendor risk management and transparency standards in the cloud industry.

How Should the Media Cover Catastrophic Data Breaches?

How Should the Media Cover Catastrophic Data Breaches?

I don’t envy those who will have to clean up a 1.5 TB data breach going back to the last millennium, involving compromised personal information shared with up to 8000 suppliers*. While the cyberattack was confirmed as far back as September, formal conclusions have yet to be published, so I’m going to take a moment…

How Disinformation Uses Online Ads, Chat Groups and the Media to Reach Users

How Disinformation Uses Online Ads, Chat Groups and the Media to Reach Users

As the team from Canada’s only cybersafety foundation briefed me on disinformation campaigns from the current conflict in the Middle East, it was immediately evident that asymmetric information warfare is being waged with increased sophistication in cyberspace. Surprisingly, while Hamas and Israel engage in brutal military battles, Western and European countries – and specifically Internet…

Is it Fair to Inform Data Breach Victims via Social Media?

Is it Fair to Inform Data Breach Victims via Social Media?

Every breach of children’s privacy is severe and has the potential to cause lasting harms. Since the watershed year 2016 when many Canadian boards of education were financially incentivised to make the irreversible leap from on-premise information systems to cloud edtech ‘learning management systems’, a massive brain drain simultaneously took place within their IT and…

Is It Time for Organized Cybercrime Reform?

Is It Time for Organized Cybercrime Reform?

As reputable outlets* breathlessly peg the global impact of cybercrime in the trillions of dollars, the reality is that the bulk of the business comes from strong-arming victims using ransomware. As recently as a decade ago, cyber-extortionists saw themselves as modern-day Robin Hoods, who merely appropriated the surplus of bloated, negligent capitalists in an effort…