First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

encryption

Ransomware threat to Canadian businesses broadens

Recent hacker attacks — including the first successful attack on an Apple computer, and several attacks on U.S. and Canadian hospitals — have reminded Canadian businesses of the need to be vigilant about the danger posed by ransomware.

 

, , , , , , , , , , , , , , ,

When should data be encrypted?

When the environment cannot be controlled, encrypting the data is necessary to protect the data against unwarranted disclosure or unauthorized and undetected modification. Note that the Internet is considered a hostile environment…

 

, , , , , , , , , , , , , ,

Protecting sensitive data against the insider threat with data masking

With an overabundance of information being stored or created in electronic format, and various tools for turning data (i.e., personally identifiable information, intellectual property, credit card) into cash, goods, and other services, the risks of doing business have increased. We are hearing more and more about attacks where the target is sensitive data, and the perpetrators are those with elevated levels of trust and access within the business.

 

, , , , , , , , , , , , , , , , , , , , , , ,

The control of the personal data ecosystem belongs to the individual

A recent release from the Information and Privacy Commissioner of Ontario on the Personal Data Ecosystem praises organizations taking initiatives to integrate the socio-economic benefits of personal information while maintaining privacy and confidentiality. The Commissioner, Dr. Cavoukian, also co-authored a paper with researchers from the United States and the United Kingdom that delineates the systems […]

 

, , , , , , , , , , , , , , , ,