With cyber attacks on the rise—and getting more sophisticated—the time to explore your risks is now. Whether your business is asking “what is phishing” or “what is ransomware”, or you are deep into assessing and upgrading your cyber resilience strategies, staying on top of the latest developments is key.
Fraud deconstructed: A Canadian city falls victim to $558K spear phishing scam
June 01, 2023
How did a Canadian city fall victim to a spear phishing scam?
Cybersecurity budgets are increasing, as are the costs of data breaches
May 08, 2023
Security budgets are increasing, but so are the number and cost of data breaches.
Canada privacy law reforms: What is changing and how does it affect you?
May 08, 2023
Digital advances have triggered changes to Canadian privacy laws.
Privacy insights 2023
February 21, 2023
How organizations can remain compliant with privacy and data protection legislation.
Top 10 growth & profitability disruptors in 2023
February 15, 2023
For the second year in a row, our experts identify the top 10 disruptive forces that will impact business growth and profitability in the year ahead.
The cyber threat lights are flashing – but do trustees know how to prevent incid...
October 26, 2022
Learn how Trustees can proactively safeguard today’s modern form of currency, personal data, to protect their plan members in a Plans and Trusts featu...
Why the banking industry must start with cybersecurity and data privacy in their...
September 07, 2022
The financial industry could be leveraging the cloud more effectively if cybersecurity and data privacy were top of mind. Following critical steps to ...
Cybersecurity and Bill C-26: How to comply with confidence
August 29, 2022
Learn how Bill C-26 can combat the disruption of critical digital systems in Canada by ensuring new cybersecurity requirements to protect businesses.
Cyber risk management: the disparities between knowing and doing
July 22, 2022
When in it comes to cyber risk management, the disparities between knowing and doing are key in determining the best tools to arm against malicious cy...
Increased cyber threats as waves of uncertainty take hold
July 21, 2022
Due to the charged political landscape, cyber threat activities are on the rise through malicious targeted attacks of opportunity. Here’s what you nee...
White paper – A cybersecurity modern approach
July 20, 2022
This white paper explains how evolving technologies and smart processes pave the way for cybersecurity capabilities and alleviate costs and complexiti...
Data And Cybersecurity: Steps To Address AI Vulnerabilities
July 19, 2022
Our technology and cybersecurity leaders speak of ways to address AI vulnerabilities and what can be done to secure businesses in a Globe and Mail int...
Top 5 tips to manage litigative cybersecurity risks
July 15, 2022
As cybersecurity threats grow in complexity, Canadian organizations need to safeguard their businesses and avoid the legal harm such attacks may impos...
Cybersecurity and cyber insurance: How a two-pronged approach can build bulletpr...
July 14, 2022
Is your business protected against the growing risk of cyber attacks? Learn how cybersecurity insurance can help your company recover financially and ...
Top 10 growth and profitability disruptors for 2022
February 24, 2022
Continued inflation, labour shortages, and supply chain disruptions are among our predictions for the top 10 growth and profitability disruptors for 2...
The great resignation: How labour shortages are increasing business risk
February 02, 2022
Labour shortages and changing demands for a more flexible workforce have created new risks for businesses. We outline the risk factors you need to con...
Case study: Boosting the cybersecurity nexus
November 22, 2021
Discover how BDO helped an energy company implement a holistic cybersecurity strategy and modernize its cyber policies
Smart farms and cybersecurity - steps to protecting your agriculture business
November 03, 2021
Today’s precision agriculture uses sophisticated technologies such as robots, sensors, and GPS technology. However use of advanced technology can brin...
Envisioning large-scale cloud migrations to accelerate digital transformation
October 26, 2021
An end-to-end strategy is key to a successful digital transformation to a cloud network. Our step-by-step guide to cloud migration helps align your cl...
Building a human firewall: How to be cyber-resilient during the COVID-19 pandemi...
December 03, 2020
With the coronavirus second wave here, businesses need to re-visit their cybersecurity strategies. We outline five key tactics to ensure cyber-resilie...