While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.
Almost one in four employees at Canada's Justice Department fell prey to internet phishing in an exercise last December.
Microsoft has reconsidered a move to cease security emails in Canada, following the introduction of an anti-spam law north of the border.
Canadian cybersecurity is languishing due to poor communication and disappointing security investments, according to research from the Ponemon Institute.
Rather than predicting the next lightning strike it is far better to pay attention to the areas we already know are vulnerable.
Whether it is a database of customer information or valuable intellectual property, an organization's "crown jewels" need to be protected with the most robust security possible.
While it's considered a form of anonymous currency, Bitcoin isn't as private as you may think.
Is it time to go back to cash? Or are there other forms of digital payment that are more secure?
With all of the money invested in security solutions, companies are getting breached at increasingly higher rates. It's time that organizations got the most out of their security vendors.
We must prepare for the security considerations when it comes to the looming technological phenomenon that is the Internet of Things.
As we in the loss prevention industry are always looking for a flag indicating there is a potential for fraud, this one looks like it is as good as any for us to display our vigilance.
There are three major foundational areas of security, that if focused on, could go a long way in preventing a security breach.
Canada's federal privacy commissioner has been replaced in a move that has sparked criticism from activists, academics and political leaders.
Up to 8,300 patients had their personal information stolen and given to financial companies by staff at Ontario's Rouge Valley Centenary Hospital.
Audit committees in Canada are falling behind the rest of the world by not spending enough time assessing cyber security, warned a KPMG report this month.
To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.
It was while working with an elite group of cyber forces in the military that Col. (Retired) Barry Hensley realized the severity of security issues facing this nation.
Security professionals should be aware of network deperimeterization, which decreases the usefulness of network edge security devices and increases the potential for device infection and data loss.
While distributed denial-of-service attacks continue to plague organizations around the world, in this month's debate experts discuss whether they should be a top of mind concern for security pros.
Chip technology can prevent criminals from producing counterfeit credit cards.
To provide assurance against counterfeit or tainted ICT products, solutions and services as well as end-to-end security practices should be addressed.
By preparing in advance, acquiring the skill sets needed and developing a communications plan in advance will go a long way in quickly mitigating a Heartbleed-like incident.
To overcome a plethora of challenges, cyber defenders must create innovative new models for protecting their organizations from increasingly advanced threats.
Poorly managed privileged credentials pose a risk, but can be mitigated in a few easy steps.
A Romanian website is publishing public Canadian records for profit.
The Data Privacy Act has been greeted with great protest from privacy advocates.
The Heartbleed bug cost the Canada Revenue Agency (CRA) 900 social insurance numbers, which were stolen by a hacker exploiting the OpenSSL flaw.
The government of Canada requested subscriber data from Canadian telecommunications firms once every 27 seconds, says a researcher.
Challenges exist in areas of technology partner selection, managing employees and corporate role identity.
In this month's debate, experts discuss whether or not companies should be obligated to sign up for cyber insurance.
Having actionable insight into the goings on of your network is tantamount to managing operational variables.
It turns out that using a DDNS service is the easiest and most pervasive method for creating sustainable command-and-control domains.
Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.
Just how vulnerable are we to an assault by the NSA, asks Illena Armstrong, SC's VP, editorial.
You can't run an effective security program without the basics, says Patricia Titus, CISO, Freddie Mac.
Disruption is expected; financial crime should be, too.
James Hill senior security architect, Consolidated Data Services (CDS), discusses his role at his organization.
In this month's debate, experts discuss whether whistleblower Edward Snowden should be granted amnesty.
Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.
Many CIOs are still unsure what role governance should play in their data archiving strategy.
Recent breaches prompt a new emphasis on education and corporate culture, says Allegis Capital's Bob Ackerman.
Despite the bullishness around information security planning and budgeting seen in the results of our survey, we're still seeing breaches like those experienced by Target
Watching highly publicized supply-chain disasters unfold, we shake our heads in disbelief - but what supply chain risks are you taking today that would be difficult to defend tomorrow?
It's how you handle yourself during and after a breach that will determine just how detrimental the breach actually is for your organization.
Similar to building a multi-layer security strategy for a business, before deciding what security controls should be implemented to protect Bitcoin transactions, we first need to identify the targets.
The average consumer has 40 or more apps installed on their mobile device, many of which they use to do their jobs, whether IT has sanctioned its use or not. The problem is that creates a "shadow IT" system.
The Albertan Information and Privacy Commissioner has formally asked the government to amend the province's Health Information Act with mandatory breach reporting and notification measures.
Well.ca, an online store selling health and beauty products, exposed names, addresses and credit card details for some of its customers in December, it admitted last month.
The Canadian government has hired Wedge Networks, a provider of cloud-based security services, to secure its computing infrastructure.
John Gibson discusses the challenges and rewards of his security role at tTech Ltd. as the senior IT security officer.
For March's threat of the month, Secunia's Kasper Lindgaard believes Java vulnerabilities should be at the top of everyone's radar.
In this month's debate, experts discuss the possible issues that the Internet of Things presents for the industry.
Cloud computing is becoming a reality that will need to be addressed by every security department.
Has mobile malware changed through time as dramatically as the headlines might imply?
We've all been breached, but there are steps we can take to evolve the system, says security strategist Dan Srebnick.
It's time to admit that the bad guys can always make a first move, says Damballa's Manos Antonakakis.
In the aftermath of the Target breach, there is a huge need for all the people who are engaging with technology to understand more about cyber threats and ways they can account for these before and after something goes down.
The needs of the organizations we protect are complex and the response required due to the criticality of the services we provide tends to put our multi-faceted operations in a state of flux, says Roland Cloutier, CSO, ADP.
Two things needed to become widely available for cyber criminals to further expand the threat landscape - a network infrastructure that allows them to operate under the radar, and currency that would let them conduct commerce anonymously.
Canadian intelligence agency officials defended themselves at a Senate hearing early in February, after it was revealed that they had collected data on passengers travelling through Canadian airports via Wi-Fi access points.
The Canadian government should overhaul privacy legislation and reign in intelligence agencies to reflect a changing security landscape, its Privacy Commissioner told parliamentarians in late January.
The best aspect of opportunistic encryption is in the fact that it can be built into our infrastructure and deployed transparently for everyone.
We take a look inside the professional world of Mat Gangwer, security architect at Rook Security.
The continued leak of classified government intelligence documents by Edward Snowden draws into question the balance of offensive and defensive capabilities of governments.
In this month's debate, experts discuss the importance of Big Data analytics in the industry today.
Let's agree on a definition of the term "security" and move forward from there, says AT&T's Chris Mark.
Following revelations of a massive breach during the holidays, Target announced it will be investing some $5 million in a cyber security coalition, researching cyber crimes and then educating us, the masses, about ways we can avoid becoming victims.
There are six security threats all businesses should be aware of for 2014, says ISF's Steve Durbin.
With the advent of nearly omnipotent video surveillance, the age-old saying "a picture is worth a thousand words," scares me more today than it ever has.
Asian nations are producing nurturing communities of security professionals that are more prepared to deal with a rapidly changing environment.
The benefits of cryptocurrency for consumers are well known, but there are also some downsides that must be addressed.
Although some progress has been made in the availability of data, we are far away from having the transparency required for risk management.
We knowingly, and sometimes unknowingly, interact with the Internet of Things on a daily basis in both our professional and personal lives.
The mobile workforce - no longer satisfied with limited access - wants access to all the applications and data needed to perform all job tasks from a multitude of personal mobile devices, anywhere, anytime.
As mobile devices are further integrated into networks, organizations will have a critical need to implement end-to-end security solutions that offer comprehensive security to provide a multi-layered security solution.
The cyber threat landscape has always been in flux and will continue to evolve. However, it seems the pace of change has increased significantly in the past few years alone.
Anyone designing a new system such as this should take security into account from the beginning. The amount of personal information that could be harvested by any breach is truly alarming.
From Adobe to Facebook, security breaches continue to be top-of-mind for both companies and users, and organizations around the globe are all wondering if they are next in line to deal with a breach of their own.
A regulatory filing indicated that BlackBerry founder Mike Lazaridis sold more than $26 million of stock in his former company.
The Communications Security Establishment Canada (CSE) has admitted that it "may incidentally intercept Canadian communications or information."
Some of Canada's best-known authors - including Margaret Atwood, Yann Martel and John Ralston Saul - added their names to an online petition condemning mass surveillance by governments and corporations.
Federal Court of Canada Judge Richard Mosley has slammed the Canadian Security Intelligence Service (CSIS).
When we think about criminal hackers, we picture a techie who lives and breathes code. But more recently, another picture comes to mind. When you get right down to it, hackers are people, too.
Privacy, as some of us once knew it, is a thing of the past, says Illena Armstrong, VP, editorial, SC Magazine.
This month's "me and my job" focuses on John Dickson, principal at Denim Group.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
Network-connected-and-configured devices can be infected by malware that provides access to patient data, monitoring systems and implanted patient devices.
As more and more organizations fall victim to data leakage, it seems that as long as no financial data is compromised, consumers seemingly don't care.
The malicious insider or outsider does not stop on the first attempt, says Verdasys' Peter Tyrrell.
I enjoy conducting security awareness training as it allows me to emphasize the importance of security to the organization, says David Sheidlower, CISO, Health Quest Systems.
It has been said that encryption simply trades one secret (the data) for another (the key). In the same way, encrypting data naturally shifts attention to that which is not protected: the metadata.
While year-end security predictions generally fail at accurately predicting much that wasn't an already a foregone conclusion, they're really more about we know right now, and there is value in that.
Big Data will become "The next big thing" - a critical re-evaluation and re-tooling of our analytical abilities. This is not about being able to query more data, but being able to query all data.
Chief information officers across the country are keenly aware of the threat not only to their intellectual property, but ultimately to their bottom line.
Vint Cerf's recent comment about privacy being an anomaly and a challenge that is too difficult to implement is unacceptable.
While information is crucial to improving an organization's posture in the marketplace, it also creates a centralized target for cyber criminals which may result in destructive data breaches.
Will 2013 be remembered as the year that DevOps accelerated into the IT mainstream or became just another trend that died in the "hype cycle"?
Ann Cavoukian, the province of Ontario's Information and Privacy Commissioner, has pledged to determine how the personal information of a disabled Toronto woman reached the hands of U.S. Customs and Border Protection (CBP).
Canada's new anti-spam law, which was passed by Parliament in December 2010, will come into force on July 1.
A new, cutting-edge forensic evidence center in Toronto is protected by technology as advanced as scientists apply to their work inside its labs.