Government Relations - Risk Management- Cybersecurity

Cybersecurity Overview

  

GLOBAL

The global cost of cyber crime is expected to rise to US $6 Trillion per year by 2021

Stronger Regulations in New York and California now require organizations to protect the information they collect, ensure they are allowed to collect it, use it legally and protect it from third parties. Other jurisdictions will follow

66 percent of global cyber breaches hit the business sector in 2018

Small and Medium size businesses are most at risk·

Cyber Insurance will play a key role in the future

The global cybersecurity market  is forecast to grow to US $248 Billion by 2023

Symantec’s annual report shows that cyber crime increased 600% in 2018. 

A average of 4,800 websites were compromised each month

Ransomware increased 12% in 2018


CANADA

Canada ranked third after the United States and the UK for the number of breaches reported in 2018

In 2018 Canada’s National Cyber Centre identified cyber crime as the biggest threat to businesses

Cyber crime cost Canada over $3 billion CDN in 2018

Cybersecurity was a $1.7 CDN billion industry in 2018

Over $500 million will  be spent by the Canadian Government on cybersecurity in the next five years and $100 per year after that.

image117

Cybersecurity Check List

  

Cyber Security

Your intellectual property, proprietary information and client records are of significant value to criminals and your competitors, not to mention various activists. Unauthorized access to your network could mean that your confidential information might be stolen, altered or destroyed. Intruders cause economic loss and embarrassment for your company by hijacking corporate websites or disrupting internal email systems.

We deliver solutions to organizations by incorporating IT security into strategic business goals and objectives. Maintaining this secure environment is essential to the professional and public reputation of all corporations. This responsibility is a daunting task with today’s environment of increasing risk. 

Corporate host environments must be secure. Any possible vulnerabilities must be identified and addressed. Our security assessment and penetration test uses custom developed methodologies. With our custom tools, our Forensic IT professionals have discovered major and undocumented vulnerabilities not discovered standard commercial tools. 


Security Assessment

A Security and Vulnerability Assessment is a review of a network to identify weaknesses that could be used to disrupt or compromise the availability, confidentiality and/or integrity of your data. We assess the network architecture layout and implementation and then provide recommendations which will reduce available opportunities for compromise by amateur, criminal or state-sponsored attackers.


Penetration Test

Penetration testing is the evaluation of the inherent security features of an IT environment to assess its vulnerability to unauthorized access. Technicians make use of commercial and custom tools, including specialized software and hardware and social engineering techniques, to simulate an attack by unauthorized persons.


Social Engineering Test

Social Engineering is the gathering of confidential information from unsuspecting employees through lies, misrepresentation, pretext or guise. Information, such as passwords and user ID’s, are used to replicate the conditions of an unauthorized attack.

image118