For businesses across Canada, the fall of 2017 will bring a dramatic shift to privacy and cyber security regulations. That’s when an amendment to Canada’s Personal Information Protection and Electronic Document Act (PIPEDA), the federal privacy law for private-sector organizations, will finally take effect. Moving forward, businesses that experience a data breach but neglect their responsibilities under the new amendment could quickly find themselves in hot water...Read More
DRS - Client Newsletter
The massive Equifax data breach that compromised 143 million personal records has triggered nearly two dozen class-action lawsuits claiming personal harm to consumers.
But businesses also have cause for concern. Many depend on information from the three major credit bureaus to approve consumer credit and employee security privileges, as well as to verify identifies. The breach compromises the risk analysis and identity...Read More
Dora the Explorer turns out to be something of a spy. And that’s a problem for many parents in the digital age.
The long-reaching arm of online advertising for children is increasingly coming under legal assault as parents seek to limit what large media companies, like Disney and Viacom, can conduct in surreptitious audience monitoring.
Viacom, whose brands include Nickelodeon, the producer...Read More
Following on the heels of the two globe-spanning ransomware worms, the HBO hack—with its distinctive blackmail component—rounds out a summer of extortion-fueled hacks and destruction and theft of valuable data at an unprecedented scale.
WannaCry and Petya raced around the planet demanding ransoms after locking up servers at hundreds of organizations. The HBO hackers pilfered 1.5 terabytes of intellectual property and business...Read More
In the past couple of years, third-party risk has grown from a topic only discussed by cybersecurity circles to a companywide concern. The tipping point may have been in 2014 when Target’s point-of-sale (POS) system was compromised, and the details of 110 million in-store customers were stolen.
How did the hackers do it? They were able to embed ...Read More
The current cybersecurity climate makes it hard not to be cautious of phishing attacks. Forget reclaiming lost family fortunes or assisting Nigerian princes, today’s phishing scams are targeted, complex and incredibly prevalent.
It feels like a new, high-profile phishing attack is getting reported every other month. In May, Google Docs users were being targeted with malicious invitations to edit fictional documents. Before that...Read More
If you work in Maine, Arizona, Texas or Alabama, you have a greater chance of malware encounters than in other states. Researchers with Malwarebytes found that geographic location matters when it comes to who gets targeted for malware attacks. These states have a higher rate of industries most often targeted for malware, including aerospace, automotive, health care, technology and oil and gas.
What’s more, geographic location...Read More
Consumers face a grim reality when it comes to securing personal information. In the past year alone, 1.4 billion records were lost or stolen in data breaches.
Yet attempts to help become noise. Every day your customers are bombarded with news about everything from weak passwords to email scams and data breaches. They’re told their data is at risk wherever they share information. But are they really listening?... Read More
As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once.
More SMB data is now stored in the cloud, too, often leaving...Read More