Blog

I’m a small business; why would a million-dollar fraud ring bother targeting me?

If you are a small business and have asked this question before, we’d like to shed some light on the actual risk small businesses are exposed to. According to the Verizon report, in 2017 there were 53,000 incidents – security events that compromise the integrity, confidentiality or availability of data – and 2,216 confirmed data breaches. Among those, 58% targeted small businesses. That’s more than half.   Why bother, you ask? Truth is small businesses are as targeted or more

Read More >

machine learning

All this talk about machine learning, but who’s teaching them?

What these two words really mean and how they can save your company time and money – you just need to ask the right questions. The concept of machine learning is everywhere in the cybersecurity industry. We might not yet have machines that can mimic human thinking in the way popular culture has been predicting for decades, but we have something that is getting close; technology that can learn. In the same way students improve the more information they receive about a

Read More >

MRC Vegas Aria Resort

5 things I learned at MRC Vegas 2018

MRC Vegas 2018 from a non-technical person’s perspective. As a marketer, it’s sometimes challenging to understand tech people when they are blabbering about technology. To avoid this, my boss sent me to MRC Vegas 2018. “Go and learn little padawan,” she said – or that’s how it sounded in my head. Once at the Aria hotel, where MRC is held, I met dozens of merchants suffering attacks of all shapes and forms. They all had one thing in common: they

Read More >

Canadian banks

Collaboration: The key for Canadian banks to combat cybersecurity

By Don Duncan, Director of Business Development for NuData Security When banks were islands The cyber threat environment for Canadian banks is rapidly changing. Cybercriminals are increasingly using sophisticated automation and other techniques to impersonate legitimate usage; circumventing what was thought to be high secure authentication. By analyzing these threats, companies can prevent a potential future attack. However, this information often stays within the four walls of the institution which found it. This lack of cross-company data sharing is forcing

Read More >