Thought Leadership

Back to All Posts.

Cybersecurity Tips for Business Travellers   Organizations face heightened cybersecurity risks when their employees travel. Business travellers are prime targets for cybercriminals, as they often carry valuable data and may not always be careful about securing their devices. This article discusses key cybersecurity exposures for business travellers...

Smishing Explained   Most businesses and individuals are familiar with phishing, a cyberattack technique that entails cybercriminals leveraging fraudulent emails to manipulate recipients into sharing sensitive information, clicking malicious links or opening harmful attachments. While these email-based scams remain a pressing concern, a new form of phishing—known...

  Important Cybersecurity Tips for Small Businesses   High-profile cyberattacks at large companies have generated national headlines and raised awareness for the growing threat of cybercrime. Despite these attacks, almost half of Canadian small businesses say they do not allocate any portion of their annual operating budget to...

Detecting and Overcoming Cryptojacking Cybercrimes are becoming an increasing threat to organizations. There are even various types of cyberattacks to be aware of now, such as cryptojacking. Cryptojacking is the unauthorized use of someone’s computer to mine cryptocurrency. Instead of buying computers and chaining them together...

How to Prioritize Cybersecurity Organizations today are under constant threat of cyberattacks as technology continues to evolve rapidly. Cybersecurity threats can not only compromise an organization’s data, but they can also be costly. According to IBM’s Cost of a Data Breach report, Canada has the third-highest...

Remote Working Burnout a Factor in Security Risk Human error is one of the largest threats to the cybersecurity of an organization. As remote work continues due to the COVID-19 pandemic, Canadian workers are reporting burnout, which can lead to more cybersecurity errors. According to Microsoft’s...

Every insurance policy starts with an application, and cyber liability insurance is no different. While the underwriting process in long-established insurance lines is streamlined, this is not the case for cyber liability insurance. Currently, application forms for cyber insurance are not standard and can be...