Preparing to Create Your Incident Response Plan

Often, when we consider creating incident response plans, we have cyber incidents in mind. This is not surprising, given the ever-increasing frequency of cyber attacks and the sophistication of the cybercriminals and their tools. However, an incident can refer to any unplanned outages that could  impact your IT environment and that can be caused by natural disasters, cyber attacks, or …

Creating Your Incident Response Plan

In a previous article we wrote about the activities and information required to create an effective incident response plan. In this article we will talk about the phases of an incident response plan in order to create a well-structured program. As a review, the incident response plan should define the goals, the various individuals involved, the roles and responsibilities, the …

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals to hack into your computer. What is social engineering exactly? Wikipedia defines it as follows: “In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential …

Best Practices for Cybersecurity Awareness Training Programs

Government agencies such as the Canadian Center for Cybersecurity (CCCS) and the National Institute of Standards and Technology (NIST) in the U.S., not to mention cybersecurity insurance companies, all stress or mandate the need for cybersecurity awareness training. The reason for this need/requirement is very concrete. In addition to cybercriminals exploiting vulnerabilities in the technology organizations use, they also prey …

The Modernization of Privacy Laws and What This Means for Your Business

In a digital world where personal information is so easily collected and may easily be used for malicious intent, concerns about privacy and the protection of personal information has become an important topic. Globally, governments have implemented or are implementing privacy laws to reflect today’s realities. The European Union’s General Data Protection Regulation (GDPR) which regulates personally identifiable data was …

Have you Heard About the Cybersecurity Onion?

Cybersecurity continues to be a top concern for businesses in Canada. This is not a surprise. In 2021, 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period according to the 2021 Cyberthreat Defense report by the CyberEdge Group. The bad news is that there is no miracle solution that will 100% guarantee that a business or …

5 Reasons to Back Up Your Microsoft 365 Data

Many SMBs have moved to the cloud to take advantage of all the benefits that it can offer. A common misconception, however, is that the data that resides in the cloud is being backed up by the service provider such as Microsoft or Google or Amazon. This is not the case. Microsoft, and other providers, operate under a shared responsibility …

Why Collaboration Data Needs to be Backed Up

In today’s business environment, the majority of collaboration content is acted upon and stored electronically in Software as a Service (SaaS) applications such as M365. Collaboration content is being modified and edited on a regular basis and is also a driver of productivity. Given the importance of this data, it is crucial to ensure that businesses have a backup plan …

Has Your IT Service Provider Changed as Your Needs Have Changed

There is no arguing with the fact that the COVID-19 pandemic has forced businesses to adjust and change the way they do business. Some of these changes may be not continue post-pandemic but many will in some form or another. Certainly, the way businesses will make decisions about how they go to market, serve their clients, and operate their businesses …