Articles By Howard Solomon

Data Breach Graphic

Ontario home healthcare provider hacked, attacker wants money ‘for telling them how to fix their security’

The attacker would like to portray itself as providing a service, but ransom and blackmail are better words. CBC News...

July 17th, 2018 Howard Solomon

How to attempt to influence an election: Start with a spear-phishing campaign

Canadians worried about the possibility of a foreign government trying to secretly use the Internet to influence politics here could...

July 16th, 2018 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today: Sextortion, unwanted remote computer access and suspect mobile apps

Sextortion attempts are increasing, make sure you close off remote computer access and mobile apps may be secretly making screen...

July 16th, 2018 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today: World Cup scam, don’t get boxed in, more Spectre bugs found

Malware in comments on websites are spreading World Cup betting sites, don’t get boxed in by cloud storage and more...

July 13th, 2018 Howard Solomon

UK info czar report highlights differences with Canada over political parties and privacy

U.K. political parties should have to follow a statutory Code of Practice under the country's data privacy law if they use...

July 12th, 2018 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today: Another cryptocurrency wallet theft, more on password security

Another cryptocurrency wallet theft reported, more on password security and why you shouldn’t contribute to a privacy breach. Welcome to...

July 11th, 2018 Howard Solomon

Cost of Canadian data breaches continues to rise, says study

The average cost of data breaches at Canadian companies is going up, it’s taking them longer to detect breaches and...

July 11th, 2018 Howard Solomon

Protection of systems from internal attacks is “rather poor,” says vendor

Infosec pros spend big bucks every year attempting to better secure their networks and assets. But if a new vendor report...

July 10th, 2018 Howard Solomon
Cyber Security Today - podcast feature

Cyber Security Today: Malware has two weapons, another macro attack and more Android security patches

A new malware strain chooses which weapon to install, the latest macro attack targets shortcuts on your desktop and the latest...

July 9th, 2018 Howard Solomon

Look for transferable capabilities, not set skills, to beat cyber talent shortage: Deloitte

Trying to fill the demand for cyber security talent is arguably the second most important job a CISO faces.  But...

July 6th, 2018 Howard Solomon