Website Admin

The Uber Hack – what went wrong and how bad is it?

Written by Mikel Pearce On September 15, Uber revealed that it was responding to a “cybersecurity incident”. Over the past weekend, various details have emerged about the incident. Wired Magazine’s early article on the breach contains a wealth of information. Uber announced on Friday that there was “no evidence that the incident involved access to The Uber Hack – what went wrong and how bad is it?

Combating cyber security threats in educational institutions

Written by Natalie Trotter Cyber-attacks within educational institutions have been growing in frequency over the years and COVID-19 further exacerbated this problem due to the rapid transition to facilitate remote learning without adequate network security measures in place. Security professionals were unable to respond quickly enough to protect from ever growing vulnerabilities due to the Combating cyber security threats in educational institutions

Cyber Exclusions and Nation State Actors – Burden of Proof Issues?

By Mikel Pearce In a recent Market Bulletin dated 16 August 2022 [1], Lloyd’s has set out its requirement that any standalone cyber policy issued by or underwritten by a Lloyd’s Syndicate must contain an exclusion which is sufficient to exclude any losses arising from a “state backed cyber-attack”. This is to be in addition Cyber Exclusions and Nation State Actors – Burden of Proof Issues?

Colonial Pipeline Third Party Lawsuits Dismissed

In May 2021 The Colonial Pipeline found itself the victim of a large-scale ransomware attack resulting in the cooperation having to shut down operations for several days. This affected many consumers and companies across the East Coast of America who were reliant on Colonial Pipeline fuel. Just over one year on, we have witnessed three Colonial Pipeline Third Party Lawsuits Dismissed

Data Storage, Cyber Risk, and the so-called “Spreadsheet Revolution”

Businesses generate considerable volumes of data and increasingly use data as a driver for business growth and innovation. More so than ever, spreadsheets are routinely used to store, dissect and analyze both non-sensitive and sensitive data alike. In a recent blog post “Mind your spreadsheets: Tips to improve your data governance before an incident”, Dan Data Storage, Cyber Risk, and the so-called “Spreadsheet Revolution”

How Hackers Beat Multi-Factor Authentication (MFA) using Enhanced Techniques and MFA Fatigue

What is Multi-Factor Authentication (MFA)? Threat actors have long been using stolen usernames and passwords to gain unauthorized access to various personal, business, and government resources until MFA. Multi-Factor Authentication (MFA) uses biometrics, SMS messages, or mobile applications to verify a user trying to log in to email, cloud file shares, and social media to How Hackers Beat Multi-Factor Authentication (MFA) using Enhanced Techniques and MFA Fatigue

What Ramifications Could Data Residency Laws Have On Your Business During An eDiscovery Investigation?

Written by Mikel Pearce, Director of Business Development Canada & UK at CyberClan, and Louise José, Marketing Consultant What is Data Residency? Data residency refers to where, or in which country, an organization stores its data. This usually implies that a certain amount of data processing is done within a country’s borders, in accordance with What Ramifications Could Data Residency Laws Have On Your Business During An eDiscovery Investigation?

REvil – A Zombie? Or Back from the Dead?

Written by Mikel Pearce, Director of Business Development Canada & UK at CyberClan Many of those reading this will recall the announcement from the FSB (Russia’s main security service) that it had “shut down” the ransomware (and “ransomware as a service” or RaaS) gang REvil, by searching and detaining 14 alleged members of the organization REvil – A Zombie? Or Back from the Dead?

The Importance of Password Managers for Business

Written by Slade Kai Cyber-attacks are on the increase and a continuous threat to the digital space. The implementation of password management policies for your business is an integral component of security posture refinement. Why Use Password Managers? Password Managers such as 1Password, Dashlane, or LastPass utilize a centralized encrypted security vault to store login The Importance of Password Managers for Business

The Need for Home Grown Cybersecurity Expertise

Written by Dwayne Robinson Organizations often mull over the idea of outsourcing specialized tasks to third-party vendors. Outsourcing tasks do not have to be limited to technical aspects of the industry and can include sales, product development, change management, information systems, information technology (IT) restoration, digital forensics & incident response (DFIR), penetration testing, and more. The Need for Home Grown Cybersecurity Expertise

Is It Time To Implement A Business Continuity Plan?

Written by Tony McEvoy The business world has seen organizations globally embracing business continuity over the last few decades. Particularly after seeing the effects of events such as 9/11 attacks, 2004’s disastrous Tsunami, numerous recessions, the recent COVID19 pandemic and the rise in cybercrime attacks, and how they have proven to impact businesses everywhere. The Is It Time To Implement A Business Continuity Plan?

CyberClan Expands Canopy-Powered Data Breach Services to Canada

CyberClan, a global leader in end-to-end cybersecurity services, today announced the expansion of its partnership with Canopy, the leader in privacy and data breach software, to the Canadian market. “We’ve seen impressive results with Canopy’s Data Breach Response software in the United States and United Kingdom, and we’re excited to bring this solution to our CyberClan Expands Canopy-Powered Data Breach Services to Canada

Under Attack? Guaranteed 15 minute response time.

Please call our emergency hotline below or fill out the form with your name, email, and phone number.

US/CAD

1 800 762 3290

UK

0800 368 8731

AUS

61 1800 413 128

Email

response@cyberclan.com

The information you provide in this form is only used exclusively to assist you. We do not share your data.

Sugandha Sood

Executive Vice President, Finance

As a professional accountant Sugandha, CPA, CGA has over 15 years of progressive finance and accounting experience across multiple industries including healthcare, medical, nuclear waste, and transportation.

Prior to joining CyberClan she worked at Energy Solutions Canada and was responsible for various aspects of accounting, financial reporting, internal controls, process improvements and taxation. Sugandha is eager to leverage her professional skills and play a vital role in the growth of the company by providing information to make informed decisions.