Cyber Resources
This means maintaining an inventory of your IT assets and keeping them up to date; disabling unused ports and services; and implementing antivirus/anti-malware/anti-phishing technologies to prevent, detect, and mitigate malware, including ransomware.
During a cyberattack, the mean time to inventory, detect, and respond are three important metrics that can impact the breach costs for your organization.
Everyone on a team should understand their roles and responsibilities for responding to a cyberattack.
This will demonstrate to employees that vulnerabilities arise and pose a threat to the entire organization.
The best example of this is a phishing email—fraudulent messages containing spam links or attachments.
MFA adds an additional layer of security around sites containing sensitive information and makes it more difficult for unauthorized people to log in as the account holder.
Keep high-level protected data (e.g., credit card and health information) off your workstation, laptop, or mobile devices, and securely remove sensitive data files from your system when they are no longer needed. In addition, always use encryption when storing or transmitting sensitive data.
Regularly review what accounts are active on your operating systems and devices. If you don’t recognize the account, or if they have not logged in for a long time, disable or remove them.
Keep your devices locked so no one else can use them. If you keep protected data on a flash drive or external hard drive, make sure these devices are encrypted and locked up as well.
If you are a victim of a security incident, the only guaranteed way to repair your computer is to erase and reinstall the system.
Humber Institute of Technology and Advanced Learning provides free cybersecurity assessments to small, medium and non-for-profit enterprises in Canada.
The Canadian Centre for Cyber Security (the Cyber Centre) is part of the Communications Security Establishment. It is the single unified source of expert advice, guidance, services and support on cyber security for Canadians.
Get Cyber Safe is a national public awareness campaign created to inform Canadians about cyber security and the simple steps they can take to protect themselves online.
Take cybersecurity into your own hands. In this Lab, you’ll defend a company that is the target of increasingly sophisticated cyber attacks. Your task is to strengthen your cyber defenses and thwart the attackers by completing a series of cybersecurity challenges. You’ll crack passwords, craft code, and defeat malicious hackers.
This page includes some information on Canadian Legislation with respect to Privacy, Cybersecurity and Artificial Intelligence. This is likely incomplete and may have some inaccuracies. It is intended to serve as a starting point for you to understand the legislation
A more comprehensive analysis can be found in my text book. You can purchase it from the following link. It is also available at some local libraries
The Personal Information Protection and Electronic Documents Act (PIPEDA) is a federal law in Canada that governs the collection, use, and disclosure of personal information by organizations in the course of commercial activities.
Bill C-63 will create stronger protections for kids online and better safeguard everyone in Canada from online hate. The bill sets out a new vision for safer and more inclusive participation online.
CASL protects consumers and businesses from the misuse of digital technology, including spam and other electronic threats. It also aims to help businesses stay competitive in a global, digital marketplace. Learn about the legislation as well as how to protect yourself from spam and how to report it when necessary.
Bill C-27 enacts the Artificial Intelligence and Data Act (AIDA). AIDA seeks to mitigate risks of harm and ‘biased output’ related to ‘high-impact’ artificial intelligence systems. It allows for regulations prohibiting the development and use of an AI system that causes serious harm to individuals, and prohibits the use of illegally obtained personal information for designing, developing and using AI.
Within the Criminal Code, there are many provisions that apply to cybersecurity and cyber-crimes. The associated provisions are contained within sections 83.2, 184, 342.1, 342.2, 380, 402.2, 403, and 430 and are explained below. Punishments can range from fines to imprisonment (in some cases for life; however, no one as of the time of writing has been imprisoned for life for a cybercrime in Canada).
Every one who commits an indictable offence under this or any other Act of Parliament for the benefit of, at the direction of or in association with a terrorist group is guilty of an indictable offence and liable to imprisonment for life
Every one who commits an indictable offence under this or any other Act of Parliament for the benefit of, at the direction of or in association with a terrorist group is guilty of an indictable offence and liable to imprisonment for life.
Everyone is guilty of an indictable offence and liable to imprisonment for a term of not more than 10 years, or is guilty of an offence punishable on summary conviction who, fraudulently and without colour of right,
Every person who, without lawful excuse, makes, possesses, sells, offers for sale, imports, obtains for use, distributes or makes available a device that is designed or adapted primarily to commit an offence under section 342.1 or 430, knowing that the device has been used or is intended to be used to commit such an offence, is … .
Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence within the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service.
Identify Theft:
Trafficking in identity information
(1) Everyone commits an offence who fraudulently personates another person, living or dead,
Mischief
(1) Every one commits mischief who wilfully
Mischief in relation to computer data
(1.1) Everyone commits mischief who wilfully
The Copyright Act contains one provision that relates to the removal of technological protections that are placed on a “copyrighted” work. Often, cybercriminals are looking for these types of assets during their attack and will often distribute them once the asset has been acquired and the protections removed.
(1) No person shall
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.