Canada Set to Require Its Businesses to Report All Data Breaches, Hacking Incidents

Cyber attacks on Canadian businesses have risen an estimated 44 percent since 2014. Is your business protected? The Canadian government is in the final stages of enacting legislation that will require all companies to report incidents related to cyber security breaches immediately. This step is intended to protect citizens’ financial and personal data, which could…

Hotel’s Ransomware Attack Demonstrates the Diversity of This Malware Threat

Businesses of all sizes and types are facing an increased threat of costly ransomware attacks, as illustrated by a recent series of attacks on an Austrian luxury hotel. In the past few years, ransomware has risen to prominence as one of the biggest malware threats facing consumers. The cybercriminals behind these ransomware attacks, however, have…

Wisdom Wednesday: Sifting Through Spam: Understanding The Dangers Of Junk Mail

Every day, businesses and individuals send over 205 billion emails all over the world. Though many of these messages contain valuable information, a large portion of them are spam. Receiving or sending spam exposes your business to a variety of risks, including: Ruined Reputations Many firms are unaware that their email accounts have been compromised,…

Embracing How Technology Affects the Culture of Work

Legal workplace cultures must change to embrace technology for efficiency, increased competitiveness, attract and retaining clients, and recruit and retain excellent people. Leaders of legal firms should change their workplace culture to embrace technology. Enlightened law firm managing partners and the law firm executives understand that fostering a work culture embracing technology increases productivity and…

Weekly Tech Tip: Create a mobile device action plan

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for…