Step Four of building cybersecurity: Identifying your risks

By Brad White | September 20, 2023

Part 6 of Cybera’s Introduction to Cybersecurity series What are some of the top cybersecurity challenges? Cybersecurity is continually challenged by hackers, data loss, privacy demands, and increased surface attack risks, coupled with the need to constantly evolve security strategies. These strategies must address these external threats, as well as internal pressures from any workforce …

Step Four of building cybersecurity: Identifying your risks Read More »

Step three of building cybersecurity: Threats vs Attacks

By Brad White | September 13, 2023

Part 5 of Cybera’s Introduction to Cybersecurity series In our previous post, we defined โ€œattacksโ€ and โ€œthreatsโ€, and provided a comprehensive list of the different threats modern organizations typically face. In this post, weโ€™ll focus on attacks. What is an attack? While threats are not always intentional (e.g. natural disasters), an attack is an intentional, …

Step three of building cybersecurity: Threats vs Attacks Read More »

Step two of building cybersecurity: What threats do you face?

By Brad White | September 6, 2023

Part 4 of Cybera’s Introduction to Cybersecurity series Once you have developed a full inventory of your operational environment (as outlined in our previous post), the next step is to try and uncover the intentional and unintentional dangers they face. From a security standpoint, threats and attacks are two separate but critical issues. For network …

Step two of building cybersecurity: What threats do you face? Read More »

Step one of building cybersecurity: What do you Know?

By Brad White | August 30, 2023

Part 3 of Cybera’s Introduction to Cybersecurity series In our previous blog post, we talked about the importance of cybersecurity in the modern world, and the different kinds of โ€œthreatsโ€ and โ€œattacksโ€ institutions commonly face. Today, weโ€™ll review how best to understand your operational environment in order to determine your specific cybersecurity risks. Knowledge is …

Step one of building cybersecurity: What do you Know? Read More »

What is cybersecurity?

By Brad White | August 23, 2023

Cybersecurityโ€ฆhow to eat an elephant one bite at a time Part 2 of Cybera’s Introduction to Cybersecurity series Cyberattacks are on the rise. According to the annual ITRC (Identity Theft Resource Center) Data Breach Report, there was a 68% increase in reported U.S. data compromises from 2020 -2021. Moreover, breaches related to cyberattacks represented more …

What is cybersecurity? Read More »

Cyberaโ€™s Introduction to Cybersecurity Series

By Brad White | August 23, 2023

Part 1 – Introduction For cybersecurity to be effective within any organization, it needs to be addressed as a continual lifecycle. Every day, new attacks are developed, so existing methods to repel them must be refined and improved. Why is cybersecurity important? Cybersecurity matters to everyone, from governments and large corporations, to small businesses, individual …

Cyberaโ€™s Introduction to Cybersecurity Series Read More »

Events

The Cyber Summit is a gathering ofย Western Canada's public, education and start-up technology leaders. The conference features workshops and discussions around the latest digital issues and solutions, and how they impact Canadians.

The Alberta Rural Connectivity Forum is an annual gathering of community and government representatives to have a solutions-based conversation surrounding the provinceโ€™s โ€œdigital divide".

ADSL Banner_june 2022

We are matching small-to-medium sized businesses and startups who are looking to adopt data science practices with emerging data scientists who are looking for in-the-field experience.

Cybera hosts data science hackathons that are open to those that want to gain experience and test their skills.

News UPDATES Subscription

Sign up to receive our news updates. We have plenty of topics for you to choose from!