Data Breaches Costing Canadian Companies, Banks More Than Ever | iPhone in Canada Blog
| | | | | | | | | | | | | | | | | | | | |

Data Breaches Costing Canadian Companies, Banks More Than Ever | iPhone in Canada Blog

IBM Security has released the results of its annual Cost of a Data Breach report, with 25 Canadian breaches included in the 2022 study. The study, … See all articles in Insights

Identity auditing: How to be a good steward of customer data and privacy rights
| | | | | | | | | | | | | | | | | | | | |

Identity auditing: How to be a good steward of customer data and privacy rights

Strict handling of customer data has become more necessary in recent years, thanks to the enactment of strong privacy laws like the GDPR and CCPA, … See all articles in Insights

IBM’s Cost of a Data Breach Report finds invisible ‘cyber tax’
| | | | | | | | | | | | | | | | | | | | |

IBM’s Cost of a Data Breach Report finds invisible ‘cyber tax’

When it comes to operational challenges, few mistakes are as costly as data breaches. Just one exploited vulnerability can lead to millions in damages, not just due to upfront disruption, but loss of respect from consumers, and potential compliance liabilities. Unfortunately, the cost of a data … See all articles in Insights

Dealing with threats and preventing sensitive data loss – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

Dealing with threats and preventing sensitive data loss – Help Net Security

Recently, Normalyze, a data-first cloud security platform, came out of stealth with $22.2M in Series A funding. This was the perfect time to catch up … See all articles in Insights

How to measure cyber risk: The basics of cyber risk quantification
| | | | | | | | | | | | | | | | | | | | | |

How to measure cyber risk: The basics of cyber risk quantification

Today’s organizations rely on metrics more than ever before. Yet when it comes to metrics, few are as important as cyber risk. Having the ability to measure cyber risks is critical for making informed security investments, and implementing the controls necessary to minimize the risk of a data … See all articles in Insights

The Dark Side of Digital Transformation: Massive Fraud
| | | | | | | | | | | | | | | | | | |

The Dark Side of Digital Transformation: Massive Fraud

A holistic approach to combatting the growing problem of fraud requires an analytics strategy that draws data from multiple internal and external … See all articles in Insights

Understanding the Benefits of Digital Transformation
| | | | | | | | | | | | | | | | | | | |

Understanding the Benefits of Digital Transformation

Digital transformation is crucial for businesses across industries since it helps them compete and succeed. It involves the integration of technology … See all articles in Insights

Properly securing APIs is becoming increasingly urgent – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

Properly securing APIs is becoming increasingly urgent – Help Net Security

Imperva released a new study that uncovers the rising global costs of vulnerable or insecure APIs. The analysis of nearly 117,000 unique … See all articles in Insights

What is SOC 2 Compliance?
| | | | | | | | | | | | | | | | | | | | |

What is SOC 2 Compliance?

Many organizations prioritize information security, including businesses that outsource critical operations to third parties, be it cloud computing … See all articles in Insights

How to check if your password has been stolen
| | | | | | | | | | | | | | | | | | | | |

How to check if your password has been stolen

Passwords are digital locks for everything that you store and share on the internet. They are meant to keep unauthorized access at bay but like any … See all articles in Insights