Results from the Canadian Survey of Cyber Security and Cybercrime

With fast moving innovations in technology, cyber security threats and incidents continue to grow in number and sophistication. The need to measure, analyze, and better understand these incidents is imperative for businesses, policymakers, and other stakeholders to effectively manage the risks of cyber threats, vulnerabilities and incidents. This is recognized not only in Canada but …

Une analyse de sécurité des moniteurs d’activité |A Security Analysis of Wearable Health Trackers

(English version below) Alors que l’horloge approchait de la nouvelle année, vous avez certainement, comme des millions de personnes, décidé de prendre de bonnes résolutions concernant votre condition physique. Pour vous aider à tenir vos résolutions, vous avez certainement décidé d’acheter un moniteur d’activité ou un bracelet intelligent. Ces bracelets d’activité sont des systèmes intégrés …

Election Cybersecurity and the Role of Political Parties

Political parties are an essential part of electoral democracy. They have also been identified by the intelligence community and academic researchers as a weak point in the cybersecurity of many democracies. The hacking of the Democratic National Committee’s emails is one prominent example of how ineffective cybersecurity by a political party can have far-reaching implications. …

Piratage par commande vocale| Voice Hacking to Spread Ransomware

(English version below) Pour Noël, vous avez certainement planifié de vous acheter ou d’offrir un des nombreux assistants vocaux disponibles sur le marché. De plus en plus de gens achètent ce type d’appareil ainsi que des appareils intelligents pour des raisons de commodité et de sécurité. Les interactions informatiques activées par la voix sont intégrées …

Cybersecurity: An Electoral Cycle Approach

The security of elections is a key issue for the defence communities around the globe. Recent examples make the urgency of this issue clear: the 2017 Presidential elections in Kenya were declared invalid amidst allegations of problems with the electoral commission’s databases and computers; Estonia’s widely respected identity card system, which is used for i-voting …

Change management in cybersecurity avec Stéphanie Amram | Gestion du changement en cybersécurité with Stéphanie Amram

(English version will follow) PROFIL DE COMMUNAUTÉ Le réseau SERENE-RISC désire partager avec ses membres des profils de personnes oeuvrant dans le domaine de la cybersécurité. Le Réseau se veut être un lieu d’échange d’information sur la cybersécurité à la fois ouvert, impartial et inclusif. À travers ces profils, SERENE-RISC offre cette opportunité d’échange afin …

Exploring User Behavior and Cybersecurity Knowledge in Online Shopping | Comportements et connaissances des utilisateurs lors de magasinage en ligne

(French below) Every year more and more people are doing their Christmas shopping online. Online Christmas shopping can come as blessing, as you can beat the queues in stores and get it all delivered to your door without leaving your house. However there are risks associated with online shopping. Cybersecurity challenges are continually evolving and …

Voter Data and the Impact of Privacy Legislation Gaps on Cybersecurity of Elections

In Canada, there are both legislative gaps and ambiguity around the privacy obligations of political parties with respect to voter data. Despite the highly sensitive nature of political preferences, political parties have been largely exempt from formal obligations to protect personal information. Privacy legislation requires that entities adhere to fair information principles, which require notice …

Human Factors in Information Security Culture

Nowadays, organizations collect, transmit, and use data to perform a variety of business-related functions. The proliferation of data makes organizations targets for cyber criminals. This threat has resulted in large investments in secure data storage, networks, and cyber-defense systems. In spite of these investments, cybercrime is still very prevalent with massive breaches being reported almost …