Media

How to Protect Your Healthcare Identity

By Terry Cutler / April 11, 2024 /

The motive behind stealing your credit card information is easy to understand, but why would someone want your medical information? Criminals can use your identity and insurance to obtain treatment and medications, often at numerous locations.

Read More

Cyber incident prevention best practices for small businesses

By Terry Cutler / April 10, 2024 / Comments Off on Cyber incident prevention best practices for small businesses

As a small business owner, you may think you are “too small” to be the target of cybercrime because you aren’t a giant, multimillion-dollar company. However, this couldn’t be further from the truth. Although the media mainly focuses on attacks on big businesses, small businesses are low-hanging fruit for cybercriminals. In this blog post, you’ll…

Read More

How to Beef Up Your Incident Response Plan

By Terry Cutler / April 7, 2024 / Comments Off on How to Beef Up Your Incident Response Plan

Are you prepared to face a cybersecurity breach, a natural disaster or a system failure? Such disruptive events can strike at any moment, causing chaos and confusion. But don’t worry. With an effective incident response plan in place, you can confidently handle any incident. This blog is intended to help you enhance your plan simply and…

Read More

Don’t Make These Incident Response Planning Mistakes

By Terry Cutler / April 4, 2024 / Comments Off on Don’t Make These Incident Response Planning Mistakes

Worried about cyberattacks hitting your business? You’re not alone. Cyberattacks pose a real danger to businesses like yours, and without a solid incident response plan, your business won’t be able to recover quickly, resulting in extensive losses. The good news, however, is that an incident response plan can help. This blog will show you the common…

Read More

Vulnerability Spotlight: The Weakness of Passwords

By Terry Cutler / April 2, 2024 / Comments Off on Vulnerability Spotlight: The Weakness of Passwords

Cybercriminals continually seek new methods to breach business systems, often succeeding due to weak passwords. Nearly 50% of cyberattacks last year involved weak or stolen passwords. Small businesses must prioritize password security and implement robust policies. Password Best Practices Use a Password Manager: Harness the power of a password manager to generate and securely store robust…

Read More

Busting Myths: The Truth Behind Outsourced Cybersecurity Services

By Terry Cutler / March 27, 2024 / Comments Off on Busting Myths: The Truth Behind Outsourced Cybersecurity Services

Welcome to the thrilling era of business in the fast-paced, digital realm! In this dynamic world, your company’s Cybersecurity infrastructure demands are constantly skyrocketing. But fear not, for there’s an exhilarating solution that will empower your organization to conquer these challenges head-on.  Picture this: by embracing the boundless possibilities of outsourced Cybersecurity services and placing…

Read More

How to Ensure Your Cyber Insurance Pays Out

By Terry Cutler / March 22, 2024 / Comments Off on How to Ensure Your Cyber Insurance Pays Out

In the current digital environment, where cyberthreats are commonplace, it makes perfect sense to have cyber liability insurance. However, having a policy doesn’t guarantee a smooth claims process. Cyber insurance policies come with varying terms and coverage, requiring meticulous examination of inclusions and exclusions and deciphering technical jargon. A thorough understanding of your policy sets realistic…

Read More

AI-Driven Voice Cloning Scams Targeting Children: A Terrifying New Reality

By Terry Cutler / March 20, 2024 / Comments Off on AI-Driven Voice Cloning Scams Targeting Children: A Terrifying New Reality

A chilling revelation has come to light: criminals are harnessing the power of artificial intelligence (AI) to hack into children’s social media accounts and clone their voices. The implications are frightening and underscore the urgent need for heightened awareness and security measures. Security experts have warned about even the most basic scammers employing readily available…

Read More

The Hidden Costs of Ineffective Data Management

By Terry Cutler / March 19, 2024 / Comments Off on The Hidden Costs of Ineffective Data Management

In today’s business landscape, data isn’t just power; it’s the lifeline that fuels business decisions, drives innovations and shapes strategies. However, businesses often find it difficult to manage the vast amounts of data they hold effectively, and that’s where data management comes into play. Simply put, data management is all about collecting, storing, and analyzing data…

Read More

Complying with Cyber Liability Insurance

By Terry Cutler / March 17, 2024 / Comments Off on Complying with Cyber Liability Insurance

If you assume your cyber insurance claim will sail through without scrutiny, think again. When evaluating your claim, your cyber insurance provider will assess whether you exercised “due care” in safeguarding your business against cyber threats. While possessing a cyber liability insurance policy is a must in today’s landscape, you cannot guarantee that your insurer…

Read More

A Deep Dive Into Data Governance

By Terry Cutler / March 15, 2024 / Comments Off on A Deep Dive Into Data Governance

Data is key to understanding customers, market trends, and internal business operations. Making the most of this information is crucial for improving customer experience, driving innovation, and enhancing overall productivity. You can unlock the full potential of your digital data with efficient data management and governance. Data management is all about organizing, securing, and sensibly retrieving…

Read More

Password best practices

By Terry Cutler / March 5, 2024 / Comments Off on Password best practices

Those who know me know how I feel about password best practices. Password protection is imperative if you want to ramp up your cybersecurity.  With the business world heavily reliant on digitalization, using technology is unavoidable. Although technology can undeniably give your business an advantage in increasingly competitive markets, many troublesome areas exist to monitor. Setting…

Read More

Monitor, Test, Restore – Making Sure Your Backups Are Ready

By Terry Cutler / March 2, 2024 / Comments Off on Monitor, Test, Restore – Making Sure Your Backups Are Ready

Backups play a critical role in any data protection strategy. However, if you depend entirely on your backups for disaster recovery and business continuity, unexpected backup failures can prove disastrous for your business. When backups are scheduled automatically, you risk falling victim to media failure, software issues, cyberattacks or even a simple human error. Fortunately, you…

Read More

Understanding Reputational Risk in Cybersecurity

By Terry Cutler / February 28, 2024 / Comments Off on Understanding Reputational Risk in Cybersecurity

Following a cyber attack, brand reputation is a critical aspect of cybersecurity, often referred to as reputational risk.  This risk encompasses the potential threat to the integrity of a company’s name, the trust of its loyal customer base, and its historical standing within the market. It stands alongside other significant cyber threats, such as digital,…

Read More

Tangerine hacked: 230,000 customers exposed

By Terry Cutler / February 23, 2024 / Comments Off on Tangerine hacked: 230,000 customers exposed

Tangerine, the latest company to be hacked in the Australian telecommunications sector, has unfortunately fallen victim to a significant data breach, wherein hackers managed to pilfer some personal information of an estimated 232,000 customers. The breach, which occurred on February 18, was brought to management’s attention on February 20, prompting Tangerine to notify affected individuals…

Read More

A Blueprint for SMBs to Thrive 

By Terry Cutler / February 21, 2024 / Comments Off on A Blueprint for SMBs to Thrive 

Organizations worldwide have navigated a tumultuous journey, and small and medium-sized businesses (SMBs) have borne the brunt of the challenges.  Given their limited financial resources, setbacks for SMBs have been more pronounced than those of their larger counterparts. SMBs face heightened stakes and unique hurdles. In the face of global pandemics or even shifting market conditions,…

Read More

The Right Cyber Insurance Coverage

By Terry Cutler / February 18, 2024 / Comments Off on The Right Cyber Insurance Coverage

Although adopting the latest technologies and industry trends is undoubtedly crucial, ensuring your business has the best cyber liability insurance is equally important. Think of it as an invisible shield protecting your business from devastating losses. However, to harness its full potential and ensure robust protection, it is critical to have a nuanced understanding of…

Read More

Top 4 Co-Managed Cybersecurity Myths

By Terry Cutler / February 13, 2024 / Comments Off on Top 4 Co-Managed Cybersecurity Myths

As a business owner, you may need to choose between relying on your in-house cybersecurity staff or outsourcing technology management to a cybersecurity service provider. There is, however, a third option: co-managed cybersecurity. This approach combines the advantages and convenience of in-house cybersecurity competent and specialized support from outsourced specialists. Cybersecurity is a “best of both…

Read More

The Challenges of Network Monitoring

By Terry Cutler / February 12, 2024 / Comments Off on The Challenges of Network Monitoring

Your network is your business’s lifeline. A healthy and secure network is critical for seamless communication and operational efficiency. That’s why it’s crucial to proactively identify issues and optimize performance through continuous network security monitoring. However, as you keep a close watch, you’ll discover many issues lurking beneath the surface. In this blog, we’ll look…

Read More

From Phishing Ploys to BYOD Risks

By Terry Cutler / February 10, 2024 / Comments Off on From Phishing Ploys to BYOD Risks

Organizations are increasingly cognizant of the dynamic cybersecurity environment in the contemporary landscape. Despite substantial global investments in fortifying against cyber threats, cybercriminals persistently find ways to breach even the most robust security defences. The primary focus of these cyber threats is often the employees, perceived as the weakest link in an organization’s cybersecurity perimeter.…

Read More

AI’s Promise and Peril: A Balancing Act

By Terry Cutler / February 9, 2024 / Comments Off on AI’s Promise and Peril: A Balancing Act

In recent years, the advent of advanced AI tools like ChatGPT and Dall-E has promised groundbreaking transformations across various sectors, from healthcare to education. These technologies offer unparalleled opportunities to revolutionize society, empowering doctors with more precise diagnostic capabilities and democratizing access to professional expertise. However, beneath the surface of innovation lies a shadow of…

Read More

Bolster Cyber Defenses With Routine Security Tests

By Terry Cutler / February 5, 2024 / Comments Off on Bolster Cyber Defenses With Routine Security Tests

Businesses today face various cybersecurity threats, from social engineering attacks like phishing to sophisticated ransomware. For business leaders like you, protecting your network is crucial since it is the lifeline of your business. Any vulnerability in your network can compromise your sensitive data, operational integrity and stakeholder trust. You must understand and address these threats…

Read More

The beginner’s guide to cyber liability insurance

By Terry Cutler / January 26, 2024 / Comments Off on The beginner’s guide to cyber liability insurance

Cyber Liability Insurance (CLI) covers the financial loss that results from data breaches. However, cyber liability is not typically included within general liability insurance and must be purchased separately. Also, each company offering a policy has different coverage options and exclusions. Why invest in cyber liability insurance? Experts estimate that the damage inflicted by cyber…

Read More

Boosting Your Cybersecurity Posture for Better Coverage

By Terry Cutler / January 23, 2024 / Comments Off on Boosting Your Cybersecurity Posture for Better Coverage

Navigating technology and insurance jargon may be hard when looking for cyber insurance for your small business. There are even different types of cyber coverage; you might not be sure what you need because you’re not a cybersecurity expert. Plus, once you have coverage, there’s always the risk of not receiving a payout in the…

Read More

Telecoms Tackle 19 Year New Security Risk

By Terry Cutler / January 15, 2024 / Comments Off on Telecoms Tackle 19 Year New Security Risk

In the ever-evolving landscape of digital threats, telecommunications companies find themselves on high alert as a newly discovered consumer security risk emerges. This threat allows scammers to circumvent identity checks for online transactions, including banking, shopping, and messaging. Surprisingly, the vulnerability lies in a feature implemented on mobile phone networks 19 years ago, which, when…

Read More

Exploring the Essentials of Cyber Insurance: Three Critical Types to Consider

By Terry Cutler / January 12, 2024 / Comments Off on Exploring the Essentials of Cyber Insurance: Three Critical Types to Consider

The surge in cybercrime underscores the importance for businesses to prioritize cyber insurance. For businesses dealing with sensitive data, awareness of cyber insurance becomes imperative for financial security. This protection shields businesses from monetary losses from cyber incidents, safeguarding their future amidst the evolving threat landscape, including data breaches, cyber theft, and ransomware. Especially for…

Read More

Understanding Cyber Insurance Realities

By Terry Cutler / January 9, 2024 / Comments Off on Understanding Cyber Insurance Realities

Cyber insurance remains crucial for businesses navigating the digital landscape and seeking protection against increased cyber threats, such as data breaches, theft, and ransomware attacks. So, understanding cyber insurance realities is critical to your protection. Four Cyber Insurance Realities Reality 1: Insurance coverage is contingent upon meeting specific requirements outlined in your policy. Most reputable…

Read More

Assume the cost of MFA’s

By Terry Cutler / January 8, 2024 / Comments Off on Assume the cost of MFA’s

Picture this: Skipping out on multi-factor authentication (MFA) is like leaving your front door open for hackers. It’s not just a small risk; it can lead to considerable losses in money, damage your reputation, and even put you out of business entirely. That’s a sinking feeling no one wants to experience. MFA isn’t just another…

Read More

Beware the Surge in “Phantom Hacker” Scams

By Terry Cutler / January 5, 2024 / Comments Off on Beware the Surge in “Phantom Hacker” Scams

A “Phantom Hacker” scam involving malevolent individuals posing as tech experts via phone, text, or email alleges that the victim’s computer or electronic device has fallen victim to a virus or hacking. And they are on the increase. “Phantom hacking” involves scammers posing as tech experts or representatives from reputable financial or banking organizations who…

Read More

Shadowed World, Real Threats: Navigating the Dark Web’s Dangers

By Terry Cutler / January 2, 2024 / Comments Off on Shadowed World, Real Threats: Navigating the Dark Web’s Dangers

Delving into the Dark Web unveils a clandestine realm where leaked or pilfered company data lurks. It’s a trove housing past and present sensitive information—passwords, logins, customer details, even credit card numbers. Yet, this digital underworld isn’t merely a repository; it’s a shadowy marketplace peddling ransomware kits, illicit substances, forged IDs, and many illegal commodities.…

Read More

Safeguarding Your Travel Bookings

By Terry Cutler / January 1, 2024 / Comments Off on Safeguarding Your Travel Bookings

Reports from various consumer affairs agencies are sounding the alarm – travel booking sites have become the latest playground for scammers looking to exploit unsuspecting travellers. In this blog, we’ll look into the latest findings from cybersecurity company Perception Point and provide essential tips to protect yourself from falling victim to these cunning scams.  Understanding…

Read More

Unwind Securely: Safeguard Your Digital Footprint on Vacation

By Terry Cutler / December 28, 2023 / Comments Off on Unwind Securely: Safeguard Your Digital Footprint on Vacation

Contacting friends and family would be much more difficult without the internet and social media platforms. After all, we can enjoy several significant moments online, protected behind our screens. Online connections have enabled us to remain in touch, never missing a minute, whether attending your friend’s virtual wedding or watching your favourite cousin’s newborn take…

Read More

Securing the Digital Landscape: Key Takeaways from Cyber Security Today’s 2023 Review

By Terry Cutler / December 26, 2023 / Comments Off on Securing the Digital Landscape: Key Takeaways from Cyber Security Today’s 2023 Review

Hey, everyone. Here is a link to Cyber Security Today, Year in Review for 2023, with Howard Solomon, the host of Cyber Security Today, and David Shipley, head of Beauceron Security in Fredericton, New Brunswick. In 2023, the central cybersecurity event discussed was exploiting a zero-day vulnerability in Progress Software’s MOVEit file transfer application. The…

Read More

Busting four popular cybersecurity myths

By Terry Cutler / December 23, 2023 / Comments Off on Busting four popular cybersecurity myths

Understanding current and evolving technology risks and their truths is critical for providing a specific direction for your business. But at times, we feel the need to break up some myths. This blog can help you with that, and after reading it, you’ll have a better idea of the threatened landscape and how to protect…

Read More

Holiday Hacks: Protecting Your Browser Amidst Festive Cyber Fervour

By Terry Cutler / December 20, 2023 / Comments Off on Holiday Hacks: Protecting Your Browser Amidst Festive Cyber Fervour

As the holiday season approaches, digital transactions transform into a bustling marketplace blending festive cheer with lurking cyber threats. Amidst the joyous celebrations, it’s paramount to fortify our digital defences beyond the conventional cues of cyber intrusion. Here, we delve deeper into safeguarding your website browser, unveiling lesser-known threats often lurking beneath the surface. As…

Read More

Cyber Security Today, Week in Review for Friday Dec. 15, 2023

By Terry Cutler / December 18, 2023 / Comments Off on Cyber Security Today, Week in Review for Friday Dec. 15, 2023

Howard Solomon of Cyber Security Today. The Week in Review and Terry Cutler of Montreal’s Cyology Labs discuss several stories from the past seven days. These include a U.K. Parliamentary report saying the country isn’t prepared for a targeted ransomware attack, North Korea’s Lazarus group is still exploiting the two-year-old Log4j vulnerability and the latest…

Read More

The Elusive Tactics of Star Blizzard

By Terry Cutler / December 17, 2023 / Comments Off on The Elusive Tactics of Star Blizzard

A shadowy group of hackers has emerged onto the global stage, orchestrating a sophisticated global spear phishing attack reportedly linked to the Kremlin. Known under an array of pseudonyms—Star Blizzard (formerly SEABORGIUM), Callisto Group, TA446, COLDRIVER, TAG-53, and BlueCharlie—this clandestine unit employs a cunning strategy. Their method? Covertly embedding seemingly harmless links within legitimate websites…

Read More

How to Achieve Strategic Cyber Risk Management With NIST CSF

By Terry Cutler / December 15, 2023 / Comments Off on How to Achieve Strategic Cyber Risk Management With NIST CSF

Keeping sensitive data and critical tech safe from cyberattacks is crucial for businesses like yours. Your survival and growth depend on how well your organization can withstand cyberthreats. That’s where cyber risk management comes into play. Businesses with solid cyber risk management strategies can build formidable cyber defences and reduce risks without compromising business growth.…

Read More

Unveiling the Digital Grinch: Fake Affiliate Scams, Giveaways, and Followers

By Terry Cutler / December 13, 2023 / Comments Off on Unveiling the Digital Grinch: Fake Affiliate Scams, Giveaways, and Followers

As the holiday spirit blankets social media, lurking beneath are cyber villains wielding deceptive tactics. Discover the dark underbelly of the festive season: affiliate scams infiltrating platforms with stolen credentials, baited fake giveaways masquerading as gifts, and the rise of counterfeit followers.  These schemes, designed by digital impostors, prey on our trust and eagerness. Unwary…

Read More

How Effectively Managing Risk Bolsters Cyber Defences

By Terry Cutler / December 9, 2023 / Comments Off on How Effectively Managing Risk Bolsters Cyber Defences

Where cyberthreats and vulnerabilities continually emerge, it’s evident that eliminating all risks is impossible. For CEOs and CSOs, there’s a powerful strategy that can help address your organization’s most critical security gaps, threats and vulnerabilities—comprehensive cyber risk management.  Implementing a well-thought-out cyber risk management strategy can significantly reduce overall risks and strengthen cyber defences. To…

Read More

Holidays and Hackers: Staying Protected Amid Festive Cyber Risks

By Terry Cutler / December 6, 2023 / Comments Off on Holidays and Hackers: Staying Protected Amid Festive Cyber Risks

The holiday season, characterized by its spirit of joy, togetherness, and festivities, is a cherished time for many. Amidst the merriment, it’s crucial to remain vigilant against potential cyber threats that tend to surge during this period of heightened online activity.  As we immerse ourselves in the season’s warmth, we must watch the telltale signs…

Read More

Behind the Scenes: What a Cybersecurity Audit Reveals About Your Network

By Terry Cutler / December 4, 2023 / Comments Off on Behind the Scenes: What a Cybersecurity Audit Reveals About Your Network

Living, working, and breathing in today’s digital age brings countless benefits, but it could be smoother sailing. Cyberattacks lurk around, threatening our very existence in the online realm. You can’t escape the constant chatter about these attacks, especially those that shake things up. It’s so staggering that it often leaves us at a loss for…

Read More

Regular Backup Testing: Save Time, Money and Energy

By Terry Cutler / December 1, 2023 / Comments Off on Regular Backup Testing: Save Time, Money and Energy

As a business owner, you’re probably already aware of the threats looming over data security in today’s digital environment. The irretrievable loss of critical data could drive your business to ruins. Apart from the financial fallout directly associated with data loss, it could also damage your reputation. While backups can help your business recover after…

Read More

Top Misconceptions About Digital Transformation

By Terry Cutler / November 27, 2023 / Comments Off on Top Misconceptions About Digital Transformation

Digital transformation is necessary for all businesses that want to thrive in today’s competitive market. Cybersecurity helps businesses like yours win new customers, improve efficiency and increase profits. However, due to several misconceptions, many business owners hesitate to take the digital plunge. In this blog, we’ll discuss the most common digital transformation misconceptions and share…

Read More

Phone Breach Red Flags: Are You Still a Target for Hackers?

By Terry Cutler / November 24, 2023 / Comments Off on Phone Breach Red Flags: Are You Still a Target for Hackers?

Amid the pandemic’s whirlwind, the rush towards remote work spun our lives into an era of mobile maneuvers and an unwavering dependence on our trusty smartphones. Yet, even now, two years down the line, this transformative wave has left a trail of companies caught off-guard by a lack of cybersecurity measures, paving a golden path…

Read More

Top Technologies Driving Digital Transformation

By Terry Cutler / November 18, 2023 / Comments Off on Top Technologies Driving Digital Transformation

When creating a budget for your business, it’s important to remember that technology costs are more than just operational expenses. They should be considered an investment that can drive your organization toward unprecedented productivity, growth and profitability. Your technology budgeting process shouldn’t just be about numbers and spreadsheets. Instead, it should be about shaping the…

Read More

The Mastery of AI and ML in Cybersecurity: Forging Empowered Cyber Sentinels

By Terry Cutler / November 14, 2023 / Comments Off on The Mastery of AI and ML in Cybersecurity: Forging Empowered Cyber Sentinels

A profound transformation is unfolding in the ever-shifting theatre of digital warfare, where the very essence of security hangs in the balance. This isn’t just a paradigm shift; it’s an epochal transformation. Artificial Intelligence (AI) and Machine Learning (ML) have ushered in an era where cybersecurity is elevated to an art form. But, one must…

Read More

Four top Black Friday scams 

By Terry Cutler / November 7, 2023 / Comments Off on Four top Black Friday scams 

Attention Black Friday enthusiasts, exercise caution! Cybercriminals are on the prowl, targeting bargain hunters aiming to seize great deals online in 2023. Black Friday, one of the busiest shopping extravaganzas of the year, is increasingly moving into the digital realm, becoming a prime opportunity for hackers to capitalize on. This day, following the US Thanksgiving,…

Read More

Rising Instances of Deceptive QR Code Scams

By Terry Cutler / November 4, 2023 / Comments Off on Rising Instances of Deceptive QR Code Scams

Consumers face an escalating threat of identity theft and data breaches by exploiting Quick Response (QR) codes, an aged technology repurposed amidst the touchless payment trends sparked by the global pandemic. QR codes, known for their black-and-white square configuration readable by smartphone cameras, were introduced in the mid-1990s. Hackers are taking advantage by superimposing fraudulent…

Read More

The Role Deduplication Plays in a Data Cleansing Strategy

By Terry Cutler / November 1, 2023 / Comments Off on The Role Deduplication Plays in a Data Cleansing Strategy

In today’s digital era, where humans produce nearly 2.5 quintillion bytes of data daily, dirty data is a concern for businesses, irrespective of size and industry. This is because any organization that handles duplicate, inaccurate and outdated information will have to deal with consequences such as: Ineffective marketing efforts: Most businesses these days use targeted promotional…

Read More