The Invisible Cyber Threat: Combating Intellectual Property Theft in Business
F12 Blog
by Jennifer Kamerman
1d ago
Brief: Intellectual property (IP) theft is a major issue for businesses, and can have far reaching impact on your competitiveness, finances, and reputation. In this article, we look at why protecting against intellectual property theft is important, how it happens, and challenges companies here in Canada face in protecting their IP from cyber criminals. “It’s ours, it is, and we wants it. The thieves, the thieves, the filthy little thieves. Where are they with my Precious?”  — Golum, The Two Towers Intellectual property (IP) theft is a major issue for businesses, and not just the big pla ..read more
Visit website
Avoiding Pitfalls in IT Procurement: Ensuring Compliance and Value in Vendor Contracts
F12 Blog
by Jennifer Kamerman
5d ago
Brief: In this article we examine common pitfalls in IT procurement, and key best practices for ensuring compliance and making sure you get value out of your vendor contracts.  A friendly piece of advice; assume that I know everything. — Moff Gideon, The Mandalorian Think back to early 2020.  It was like a sudden storm shaking the very foundations of supply chains globally. Companies that might have once taken their supplier relationships for granted found themselves in a scramble—facing shortages, transportation nightmares, and a whole range of supply chain issues.  This was a ..read more
Visit website
​​A C-Suite Guide to Managing A Cyber Security Breach Disclosure
F12 Blog
by Jennifer Kamerman
1w ago
Brief: In this article we share how to manage a cyber security breach disclosure. As a C-Suite executive, the stakes are high, because how you manage and disclose a breach can significantly affect your company’s reputation, customer trust, and even its financial health. “It is possible to commit no errors and still lose. That is not a weakness. That is life.” — Captain Jean-Luc Picard Star Trek: The Next Generation   How To Manage A Cyber Security Breach Disclosure The news is full of breach alerts, but do you ever think about your responsibility and how you might handle it if a bre ..read more
Visit website
Microsoft Teams Licensing Changes for Canadian Customers
F12 Blog
by Kathleen Mitchell
1w ago
Microsoft Teams Licensing Changes for Canadian Customers On April 1st, 2024, Microsoft introduced significant changes to the licensing of Microsoft Teams, affecting new enterprise customers globally. This article will highlight these changes, focusing on how they impact Canadian customers, and provide a detailed look at the options available for both new and existing subscriptions. Overview of Changes Previously, Microsoft bundled Teams with Office 365 and Microsoft 365 suites. However, as of April 1st, Teams has been unbundled and requires a standalone purchase for new enterprise customers ..read more
Visit website
What Happens After A Cyber Attack On A Small Business 
F12 Blog
by Jennifer Kamerman
1w ago
What Happens to Your People in the Aftermath of a Cyber Attack on Your Small Business?  Brief: In this article, we explore what happens after a cyber attack on a small business, the impact on the people within your business, and what you can do about it.  “I would have followed you, my brother, my captain, my king.” — Boromir, The Fellowship of the Ring Attacks and breaches on big international businesses are in the news all the time.  Yet, practically half of cyber attacks happen to small businesses, and when they happen, like Boromir, your employees look to you for leadership ..read more
Visit website
Understanding The ROI of Cyber Security 
F12 Blog
by Jennifer Kamerman
2w ago
How to Calculate the ROI of Cyber Security + 11 ROI-focused Thought Leaders to Follow  Brief: In this article, we look at why determining the ROI of cyber security is so important, explore a number of frameworks to calculate the ROI, and share 11 ROI-focused cyber security thought leaders to inspire your planning.  “Never argue with the data.” – Sheen, Jimmy Neutron Imagine you’re a small Canadian retailer that has grown rapidly and relies heavily on e-commerce. You know cyber security is important but haven’t conducted a thorough ROI analysis due to perceived high costs and complexi ..read more
Visit website
Why Do Hackers Target Businesses? 
F12 Blog
by Jennifer Kamerman
2w ago
3 Reasons Your Business Is At Risk From an Attack  Brief: In this article, we look at why hackers do what they do. We explore hackers’ goals, what they want, and how hackers make money. We dig deep and answer the question, “why do hackers hack.” Understanding the motivation is fundamental to securing your business from attacks.   “Things are only impossible until they’re not.” — Captain Picard, Star Trek It seems impossible that your business could be targeted by a cyber attack. And, given the recent rise of cyber events, it might seem like your newsfeed is all “hackers hackers ..read more
Visit website
OT Security Definition + Solutions to The Biggest Challenge
F12 Blog
by Jennifer Kamerman
2w ago
Balancing Operational Continuity with Cyber Security is Becoming Harder Than Ever   Brief: In this article, we define OT security, look at the challenges facing OT security teams, examples of real OT security issues, and explore common solutions and tips to address these challenges.  “You are unwise to lower your defenses.” — Darth Vader, Star Wars OT, or Operational Technology, encompasses the hardware and software systems that monitor and control physical processes, devices, and infrastructure. Its security is crucial for ensuring the uninterrupted operation of essential servi ..read more
Visit website
Industrial Control Systems ICS Security Defined
F12 Blog
by Jennifer Kamerman
2w ago
How to Protect Your ICS in 2024 Brief: In this article, we define ICS security, provide a few examples of recent ICS security issues here in Canada, and what Canadian businesses can do to better strengthen their ICS security posture.  “You can’t stop the change, any more than you can stop the suns from setting.” — Shmi Skywalker in The Phantom Menace Industrial Control Systems, pivotal to managing and automating essential services and processes, have traditionally been seen as targets for external threats, especially from nation-states aiming to steal corporate or government secrets.  ..read more
Visit website
Best Practices for Remote Work Security 
F12 Blog
by Jennifer Kamerman
2w ago
3 Key Steps For Securing Remote Work Environments Brief: Over the last five years, remote work has undergone significant transformation, driven by technological advancements, cultural shifts, and unexpected global events. In this article we look at how remote work has changed, and 3 steps you should take to develop your company’s remote work security strategy.  “Do you have any idea what it’s like for me, being totally alone? Look, I’m not just a visitor out of another place. I’m out of another time!”  – Buck Rogers And for remote workers, it can often feel like you’re on an island ..read more
Visit website

Follow F12 Blog on FeedSpot

Continue with Google
Continue with Apple
OR