Blog | janvier 26, 2021
How do you perform an AAR that doesn't collect dust on a shelf?
An after-action review (AAR) is a tool that supports organizational continual learning and improvement. Like any tool, it is only as good as its application, so a careful evaluation process and comprehensive data collection and analysis is critical. The AAR has been refined over years of application and is considered a best practice. So why do so many AARs fail to meet the needs of the organization?
Calian's 2020 Annual Report
Despite the challenges that came with COVID-19 in 2020, Calian Group Ltd. delivered an impressive performance in it's fiscal year. To read the company's full annual report and learn more about the 2020 fiscal year highlights, download the report here.
Calian Cyber Security Podcast: The IoT Attack Surface copy
Chances are you or someone you know has an IoT device from a smart home speaker, to a smart thermostat, or even a video doorbell. These and devices like them are also making their way into the corporate environment—creating an entirely new attack surface for cyber criminals.
Calian Cyber Security Breach Report - Issue 15 Data Breaches in Online Education
In today's digital business environment, enhanced and holistic cyber security is essential. However, many companies continue to struggle with resilience, often experiencing breaches that lead to everything from compliance issues, to lost and stolen data and, ultimately, to brand damage and revenue loss. And though it is easy to read about these breaches, the causes and potential solutions are rarely identified.
Calian Cyber Security eBook - The worst passwords of 2020
How to Avoid Becoming the Next Cyber Crime Victim
Blog | novembre 26, 2020
This is all about your employee’s stolen identity
Everything in the modern age is digital—and of course you all know that. However, most people rarely contemplate what data is circulating around out there in the ether. Take one step further down the rabbit hole and apply that to personal data and, again, many still don’t internalize the importance or magnitude of what they create, share, and what is ultimately stolen for nefarious purposes.
Blog | novembre 24, 2020
Virtual, Traditional, or Hybrid EOC What do you need to achieve?
An emergency operation centre (EOC) should enable people to respond to and plan the recovery from an emergency as effectively as possible. This is true of a brick and mortar EOC, a virtual EOC, and of a hybrid model. While there are many solutions, it is critical to begin with the right question. The question should be, “What do we need to achieve?”
Calian Cyber Security White Paper - Data and its importance to endpoint security copy
In today’s ever-connected world, the ability to access corporate data from virtually any device, such as tablets, phones and laptops, from any location, poses a significant threat to organizations and their cybersecurity teams. With the proliferation of connected devices on networks, including virtual machines, point-of-sale (POS) terminals and IoT devices, IT security professionals are increasingly spending more and more time managing and securing these devices and the variety of applications they deliver. This is a major challenge, as many of these are privately owned personal devices, making it difficult for cybersecurity teams to monitor and secure them. This is a security nightmare, as a personal device can expose an entire network to risk with just one security incident. And these devices are proliferating. In its 2011 Annual Security Report, Cisco found that three out of four employees worldwide have multiple devices, such as a laptop and smartphone, and one in three young professionals uses at least three different devices for work (Cisco, 2011). With the number of endpoints increasing— according to Intel there will be more than 200 billion connected devices by 2020—there is a corresponding increase in the vulnerability of the network to a vicious cyberattack from malware threats and online sources (Intel, n.d.). A frightening scenario, as Cisco’s report also found that the most popular mobile platforms—Apple iPhones and iPads and Google Android devices— are now targets for malware.
Calian White Paper - Identity and Access Management Essential In Today’s Data Driven Digital World
Identity and Access Management (IAM) is inextricably linked with big data. It is inevitable as organizations find themselves in the throes of being responsible for an ever-increasing volume of highly sensitive data; for instance, credit and debit card numbers, medical insurance information, and healthcare related information. According to Gartner, through 2017, 90% of the information assets from big data analytic efforts will be siloed and unleverageable across multiple business processes. Therefore, it is critical that organizations implement IAM technologies to help with the complexity and volume of big data while ensuring continued functionality. IAM technology includes password-management tools, security policy enforcement applications, provisioning software, reporting and monitoring apps, identity repositories, and more. By implementing IAM, organizations will be able to handle the complex relationship that exists from the need to generate business value while, at the same, protect intellectual property and individual privacy and, of course, being in compliance with all regulatory requirements.
Calian White Paper - How CASB 2.0 Helps Embrace The Cloud & Safeguard Sensitive Data
Over the past decade, computers and servers have dramatically and increasingly become more powerful, so much so that companies will never be able to use them to full capacity. So, why should organizations pay money on technology they will never use? Instead, cloud computing offers an appealing alternative: pay only for what is used, increase and decrease services as required. As the adoption of cloud computing has grown, so too have the risks. According to the Ponemon Institute and Accenture’s 2019 Cost of Cybercrime Study, malware and malicious insider-related cyber attacks jumped 12% in 2018, accounting for one-third of all cyber attack costs. The cost of malware to companies increased 11%, to more than US$2.6 million on average for each company. Malicious insiders—employees, temporary staff, contractors and business partners—jumped 15%, costing each company on average US$1.6 million (Ponemon Institute and Accenture, 2019). While cyber threats to businesses have multiplied, the “next generation of cloud app security” has emerged to combat cyber criminals and safeguard the organization: Cloud Access Security Broker (CASB) 2.0 protects cloud apps and data—regardless of the user, location, or access device (Symantec, n.d.).
Étude de cas | Solutions de cybersécurité
Calian Cyber Security Solutions - The Breach Report
In today's digital business environment, the need for enhanced cybersecurity is imperative. However, many companies continue to struggle with resilience, often experiencing breaches that lead to everything from compliance issues, to lost and stolen data and, ultimately, to brand damage and revenue loss. And though it is easy to read about these breaches, the causes and potential solutions are rarely identiﬁed. Each month, we spotlight a particular type of company, the breach they have experienced, and what they could have done to mitigate risk against the speciﬁc type of cyberattack—all to create better insight for the general public and to educate people on proper cybersecurity best practices.
Guide de reference rapide pour l es professionnels de la santé