Data Breach Notification Myths Busted

With the advent (and multiplication!) of privacy regulations around the world at both national and sub-national levels, it can be hard to know what your obligations and responsibilities are under these laws. These various frameworks are driven by … Continue reading Data Breach Notification Myths Busted

How to Build Board-worthy Cybersecurity Business Cases

We have looked at Cybersecurity business cases in the past, relating the cost of a proposed solution to the potential cost of a breach. That framework hasn’t gone away – but, there are some other pieces to consider when crafting a cybersecurity bu… Continue reading How to Build Board-worthy Cybersecurity Business Cases

Why Your Cybersecurity Process is the Problem

For those who don’t know, we have three P’s in cybersecurity; people, platform, and process. Invariably, the first step companies take towards securing their organization is by investing in platform (technology): anti-virus, usually fo… Continue reading Why Your Cybersecurity Process is the Problem

PIPEDA Best Practices Achieved with MDR

Last week, changes to the Personal Information Protection & Electronic Documents Act (PIPEDA) went into effect. Our CTO, Adam Mansour, wrote about the changes, and how our MDR service could help overcome new disclosure, reporting, and data ret… Continue reading PIPEDA Best Practices Achieved with MDR

PIPEDA Best Practices Achieved with MDR – Part 2

The previous part of this post discussed tips that the Office of the Privacy Commission of Canada (OPC) issued in anticipation of the November changes to the Personal Information Protection and Electronic Documents Act (PIPEDA). Those tips fell un… Continue reading PIPEDA Best Practices Achieved with MDR – Part 2