Blackbaud breach – Executive Options in light of Reports to OPC & ICO
Three Executive Actions to help mitigate further risk If your company leverages Blackbaud CRM – this article will provide you of three actions that will help mitigate risk. Blackbaud a reputable company that offers a customer relationship management system has been hit and paid off ransomware. According to G2, Blackbaud CRM is a cloud fundraising and…
Social Media Analytics Drivers
By Aydin Farrokhi and Dr. Wael Hassan Today, the public has remarkable power and reach by which they can share their news, and express their opinion, about any product or services or even react to an existing state of affairs, especially regarding social or political issues. For example, in marketing, consumer voices can have an enormous…
The Necessity of Multi-Scanning
Last Friday, the WannaCry cyberattack effected more than 300,000 computers, impacting thousands of businesses, hospitals and enterprises, across 153 countries by taking advantage of outdated versions of Windows that never had updated Microsoft’s crucial security upgrades. With the increasing amounts of advance threats by attackers and the overall skyrocketing growth of malware, relying on a…
Political Cyber Security
The daily life and economics of the global citizen depend each time more on a stable, secure, and resilient cyberspace. Even before was elected president, Donald Trump promised to make cyber security “an immediate and top priority for [his] administration.” Yet, months into his presidency, Trump and global leaders worldwide have struggled to deal with…
Bill C-23: Pre-Clearance of Persons and Property
Quick Summary of Bill C-23 It is no secret that Canada and the United States have one of the most important trading relationships in the World. While the American presidential election has taken the spotlight in terms of politic news, ad of late, the Canadian federal government is proposing to rewrite Canada’s electoral laws. On June…
Cyberwarfare & National Security
Sochi Olympics, 2014: Athletes’ cell phones were compromised within minutes of landing at the airport. Viber, WhatsApp, Twitter, and other apps are commonly used to locate terrorist targets in Syria. As a counterpoint, recruitment for terrorist groups such as ISIS is largely done online as well. Use of bots/humans to broadcast government agenda in Saudi…
Legal Obligations for Energy Boards
In this guide you will explore: Obligations of Energy Boards FTC and Fair Information principle requirements Smart Grid Data Protection Requirements Employee Privacy in the Energy Space Federal and state law requirements In recent years, news of massive data breaches has become almost commonplace. We are witnessing an unprecedented increase in cyberattacks, with energy utilities…
Practical Guide to Privacy & Security for Retailers
Retailers are facing risks as more and more of their operations is moving online. These risks are legal, reputational, operational, investment, and data breaches. In this report you will learn about: Boards, Executives, and Privacy Compliance Obligations What You as a Director Can Do FTC and Canadian Privacy Obligations The report will provide you with…
Data Protection in Design
Time for a New Vision Up until now, we have viewed privacy and security on the same sliding scale, through which it appears to be impossible to have one without hurting the other. Envisioning a country where privacy is prioritized over security and surveillance seems absurd. However, it is time that we disrupt this traditional…
Canada’s Security Agency Issues:Top 10 Actions to Take to Eliminate Cyber Threats
In this series of posts, we review recommendations for workplace cyber security published by the Communications Security Establishment Canada. Today, we offer commentary on CSEC’s Top 10 recommendations for strengthening cyber security. The Communications Security Establishment Canada’s (CSEC) Top 10 IT Security Actions bulletin offers ten recommendations that promise to eliminate the vast majority of cyber threats…
The Best Encryption ceases to work upon the first authorized access
Has encryption protect google and yahoo against NSA snooping, simply not. Was the NSA protected against data extract by an ‘authorized’ user who threatened the nations security? not really. Hence we say that best encryption ceases to work upon the first authorized access.