Tag: "post-widee"

cyber security

A Paperless Society

Although apparently a hardware problem, rather than any type of virus or malicious attack, this incident in the NHS trust shows the dangers of relying on technology. Pennine Acute trust had to cancel approximately 650 appointments because of an IT failure. Whatever the benefits of IT, and there are many, in the area of health […]

identity theft

What are The Most Common Identity Theft Techniques

According to the FTC, the most common identity theft techniques normally relate to the fraudulent use of credit cards, and the opening of bank accounts or other types of financial accounts in someone else’s name. These types of account of venues to obtain fraudulent loans or credits which are credited to the person whose identity […]

identity theft

How do You Fix Identity Theft?

The very idea of identity theft either really scares people, or is dismissed as being a bit of a project fear campaign. This is often because of a misunderstanding of what the term identity theft can mean. It can either mean wholesale theft of someone’s identity, credit card fraud, tax fraud, child benefit fraud etc. […]

identity theft

Does Identity Theft Protection Work?

A number of companies offer identity theft protection services, some of them quite costly, and in truth offering protection that has some value but is fairly limited in reality if your identity has been stolen. Firstly it is important to look at how much of a risk people people are at in terms of having […]

identity theft

Rise Of Cyber Crime – Virtual Kidnapping

A Chinese student fled her Vancouver home in fear after online scammers threatened to harm her parents in China if she did not comply with their demands. Police say she’s one of three in the last month who have fallen prey to the extortion scheme. All three victims and their families suffered financial loss in […]

cyber insurance

Top Cyber Insurance Companies – Hiscox

Hiscox have managed to establish themselves relatively quickly as probably the market leader in cyber liability insurance, in part based on the policies they provide, in part on the resources and risk modelling they help with, and in part on the existing customer base which has a high focus on small business and various types […]

identity theft

Cyber Insurance Cost Examples – Equifax

The data breach at Equifax sent shockwaves throughout the Internet, and throughout the financial community generally. This is in large part is because of the huge amount of sensitive data that all credit rating agencies hold on individuals, and the fairly natural assumption that data is kept safe. According to CNN, the breach involved the […]

identity theft

Cyber Insurance Cost Examples – Yahoo Data Breach

Yahoo provides one of the best examples of the enormity and severity of what can happen with a data breach. Although a few years old, Yahoo suffered three data breaches which were only reported two or three years after they happened. Estimates of accounts breached ranged from 500 million through to every single one of […]

internet of things

How Smart Bandages could Change Healthcare

A wound dressing that detects the first signs of infection is more than just a Band-Aid solution for the University of Victoria researchers who developed it. University of Victoria bioengineer Mohsen Akbari believes the “smart bandage” could transform wound care and help reduce chronic and deadly infections. Akbari was lead investigator for a study on the “smart bandage” and associated app that was published Sept. […]

cyber insurance cyber security

Taking back your Online Privacy

There’s a strong chance you’ve recently seen an email or pop-up box offering “some important updates” about the way a social media company or website plans to use your data. Are we about to regain control of our personal information? In our increasingly connected world, data has come to be seen as something to buy […]

cyber insurance cyber security

Hacking Las Vegas ……..

In what could have been the plot of a Hollywood heist movie, the hackers took great interest in the vast aquarium that a Las Vegas casino had installed in its lobby. The casino’s owners thought that the huge fish tank was an impressive sight that helped create a classy ambience as people arrived. What they […]

cyber insurance cyber security

Dangers of Data Sharing In Healthcare

The (UK) government has been accused of failing to act on “serious concerns” raised by doctors and MPs about an NHS policy that sees patient details shared with immigration authorities. The Health and Social Care Committee warned earlier this year that NHS Digital was failing to uphold the interests of patients with the existing memorandum of understanding (MoU), through which patient data […]

cyber insurance cyber security

How your Browser can Betray you …..

Web browsers store an incredible amount of sensitive information about you. Website developers have a variety of ways of using modern browsers to customize the experience for users. Advertisers also use these features to maximize the impact of ads shown on sites. The result is that a lot of information about you is stored deep […]

cyber insurance cyber security

How Artificial Intelligence is changing Corporate Canada

Corporate Canada is starting to wake up to AI. Name any sector and you’ll find at least one established player that has experimented with it – not the stuff of Terminator or 2001: A Space Odyssey, machines with human-level consciousness and perception, but software in narrower areas of machine learning. Artificial-intelligence technology has advanced enough […]

internet of things

Sony goes into Smart Homes

Sony today announced a collection of new products that it plans to showcase during the IFA consumer electronics show in Berlin, Germany this upcoming weekend. One of the biggest additions to the company’s line-up is a new smart home speaker, called the LF-S50G wireless speaker, which looks similar to Apple’s upcoming HomePod, has a built-in […]

google home

How Google is taking over Your Home

Google’s push to place its digital assistant, the search giant’s new product centrepiece, inside every consumer appliance imaginable is edging forward. The Alphabet Inc. unit announced on Wednesday that its voice-based chat service is now compatible with a wave of home devices, including speakers and everyday household appliances like refrigerators. A fter arriving on Google’s […]

cyber insurance

Who are the top Cyber Insurance Companies?

Cyber Insurance needs to provide not only financial indemnity, but also some type of Incident Management Team.This normally includes IT Specialists, Lawyers, Ransom Negotiators etc. Finding the right Cyber Insurance Company can be tricky, and expensive if you get it wrong. Cyber Insurance is a relatively new form of insurance, and until quite recently was […]

cyber security

Big Data Key to Fighting Disease

A major part of this effort is now also being focused on improving the data about the impact that AMR is having on global health in a bid to convince policymakers that more needs to be done, and faster, to meet the challenge. Key to this approach will be use of the Global Burden of […]

cyber security

Big Data Helping People Back into Work

Worxica is a labour market information research tool built for use by Canadian job seekers, students, and employers. After entering a job title and location, they can see a summary showing the number of applicable local job ads advertised over the past year, who has been hiring, the typical annual wages offered, skills and certifications […]

cyber insurance cyber security

Cyber Security Basics

Many people think that cyber security only applies to big companies and governments, and that it should like to be dealt with by the IT guys. Anyone who owns a computer, who works with a computer or who has a smart phone needs to be aware of some pretty basic rules about cyber security, both […]