June 23, 2016
Ransomware is a type of malicious software that is designed to block access to data on a computer, or sometimes even the computer system itself until the owner pays a ransom for its release.Ransomware can arrive on a computer system the same way any other malware does. The difference with malware and ransomware is that usually those who install ransomware to hold the data hostage are usually not able to breach the data themselves.Here are 7 ways...
April 29, 2016
Canadian mining company Goldcorp Inc. has confirmed on April 28th, 2016 that the company’s network has been compromised following a massive cyber breach. This makes them the second Canadian gold miner to be hacked since 2015.
Goldcorp Inc. is currently working to determine the full scope and impact of the incident; however 14.8 gigabytes of private employee data, banking information, wire transfers, payroll information, international...
April 04, 2016
Cyber-attacks and data breaches are amongst the top threats that are usually top of mind for risk managers and the insurers who whelp them. Most risk managers understand that it is no longer a question of “if” but instead “when” their company will experience an incident.
According to a recent IBM report (2015 Cost of Data Breach Study), the per-record cost of a data breach reached $154 in 2015, up 12% from $145 in 2014....
March 10, 2016
Currently, there are hundreds of thousands of tech startups in North America with this number increasing every year. Decades ago, a substantial amount of money was needed to start a technology company. Nowadays, it doesn’t require much to start a high tech company. Many people are starting their own tech companies on a tiny shoestring budget operating out of their home or tiny remote offices.
Unfortunately, tech startups can be an easy...
February 03, 2016
Over the past few years, cyber risk has taken spotlight and has become a major concern for most organizations. Many companies purchase cyber liability insurance policies to help cover their risk of computer fraud or attack. However, if not properly negotiated, some cyber insurance policies may not fully protect against all risks.
‘Voluntary transfers’ are a common and potentially costly risk that your cyber liability policy may not...
January 25, 2016
According to Cisco’s 2016 Annual Security Report, 91.3% of malware use domain name servers (DNS) to gain command and control, exfiltrate or redirect data.
DNS’s are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines access the websites...