Tailgating and Piggybacking Explained

Tailgating and piggybacking are low-tech tactics used by malicious actors to access restricted areas. They occur when an unauthorized individual gains physical access to a…

Read more
Common Social Engineering Tactics to Watch For

Social engineering refers to a cyberattack method in which a cybercriminal preys on key human behaviours (e.g., trust of authority, fear of conflict and promise…

Read more
Cyber Insurance: Insights for Canadian Businesses

In the rapidly evolving digital era, Canadian businesses face an increasing risk from cyber attacks and data breaches. Understanding what cyber insurance is, particularly in…

Read more
Cyber Hygiene Best Practices

Cyber hygiene refers to habitual practices that ensure critical data and digital systems are handled safely and protected from cyberattacks. Cyber hygiene is increasingly vital…

Read more
The Risk of Shadow IT

Cloud-based services are rapidly growing. With new growth comes new challenges, and shadow IT is one area of concern. Shadow IT refers to the use…

Read more
Cybercriminals Are Weaponizing Artificial Intelligence

Artificial intelligence (AI) has become increasingly popular in recent years, offering functions that simulate human intelligence. While AI technology offers numerous benevolent applications, cybercriminals can…

Read more